Sciweavers

232 search results - page 15 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
MOBIHOC
2012
ACM
12 years 9 days ago
EV-Loc: integrating electronic and visual signals for accurate localization
Nowadays, an increasing number of objects can be represented by their wireless electronic identifiers. For example, people can be recognized by their phone numbers or their phone...
Boying Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Don...
CHI
2008
ACM
14 years 10 months ago
Increasing the accessibility of pen-based technology: an investigation of age-related target acquisition difficulties
This paper describes the author's dissertation research on improving the accessibility of penbased technology. The first step for this research was to gather information on t...
Karyn Moffatt
ICPP
2005
IEEE
14 years 3 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
ENTCS
2007
128views more  ENTCS 2007»
13 years 9 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
ARC
2009
Springer
142views Hardware» more  ARC 2009»
14 years 4 months ago
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Abstract. This paper presents implementation results of a reconfigurable elliptic curve processor defined over prime fields GF(p). We use this processor to compare a new algorit...
Brian Baldwin, Richard Moloney, Andrew Byrne, Gary...