Sciweavers

498 search results - page 45 / 100
» Being Sensitive to Uncertainty
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
LAWEB
2009
IEEE
14 years 2 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
RTCSA
2007
IEEE
14 years 2 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
AI
2005
Springer
14 years 1 months ago
Privacy Compliance Enforcement in Email
Privacy is one of the main societal concerns raised by critics of the uncontrolled growth and spread of information technology in developed societies. The purpose of this paper is ...
Quintin Armour, William Elazmeh, Nour El-Kadri, Na...
ISCAS
1994
IEEE
60views Hardware» more  ISCAS 1994»
14 years 5 days ago
A Comparison of First and Second Generation Switched-Current Cells
The Switched-Current SI technique is a circuit method that enables analog sampled-data circuits to be realized with a standard digital CMOS process. At this time it is fair to say...
Peter M. Sinn, Gordon W. Roberts