Sciweavers

3999 search results - page 20 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
106
Voted
ACMDIS
2004
ACM
15 years 7 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
127
Voted
JCP
2008
119views more  JCP 2008»
15 years 2 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
CCS
2008
ACM
15 years 4 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
HOTI
2005
IEEE
15 years 7 months ago
A Scalable, Self-Routed, Terabit Capacity, Photonic Interconnection Network
We present SPINet (Scalable Photonic Integrated Network), an optical switching architecture particularly designed for photonic integration. The performance of SPINet-based network...
Assaf Shacham, Benjamin G. Lee, Keren Bergman
SACMAT
2010
ACM
15 years 19 days ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino