Sciweavers

1150 search results - page 122 / 230
» Beacon Based Authentication
Sort
View
MSS
2005
IEEE
79views Hardware» more  MSS 2005»
14 years 2 months ago
Mitigating Risk of Data Loss in Preservation Environments
1 Preservation environments manage digital records for time periods that are much longer than that of a single vendor product. A primary requirement is the preservation of the auth...
Reagan W. Moore, Joseph JáJá, Robert...
SPW
2005
Springer
14 years 2 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
EDOC
2000
IEEE
14 years 1 months ago
Pay As You Go-Associating Costs with Jini Leases
Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept o...
Peer Hasselmeyer, Markus Schumacher, Marco Vo&szli...
CHI
1997
ACM
14 years 1 months ago
Supporting Knowledge Workers Beyond the Desktop With Palplates
Palplates are a collection of touch-screen terminals placed around the office enabling human-computer interactions at the point of need. Supporting a community of mobile authentic...
Jennifer Mankoff, Bill N. Schilit
WETICE
1996
IEEE
14 years 1 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman