Sciweavers

319 search results - page 53 / 64
» Controlled Secret Leakage
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
OZCHI
2006
ACM
14 years 1 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
BIOSYSTEMS
2008
72views more  BIOSYSTEMS 2008»
13 years 8 months ago
The manipulation of calcium oscillations by harnessing self-organisation
This paper investigates how self-organisation might be harnessed for the manipulation and control of calcium oscillations. Calcium signalling mechanisms are responsible for a numb...
Cristina Costa Santini, Andy M. Tyrrell
MOBISYS
2009
ACM
14 years 8 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
ICSE
2005
IEEE-ACM
14 years 8 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...