Sciweavers

1150 search results - page 151 / 230
» Beacon Based Authentication
Sort
View
SELMAS
2004
Springer
14 years 2 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
CSIE
2009
IEEE
14 years 1 months ago
Flash-Based Tool for Earthquake Epicenter Identification
Previously, the methods used by scientists to locate an earthquake epicenter were so cumbersome, even for scientists, that the epicenter location methodology needed to be simplifi...
Youwen Ouyang, Matthew Lehmann, Katherine Hayden, ...
ICSE
2001
IEEE-ACM
14 years 1 months ago
Dynamic and Selective Combination of Extensions in Component-Based Applications
Support for dynamic and client-specific customization is required in many application areas. We present a (distributed) application as consisting of a minimal functional core – ...
Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre ...
ACSAC
2000
IEEE
14 years 1 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 10 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...