Sciweavers

247 search results - page 32 / 50
» Information hiding for trusted system design
Sort
View
FC
1997
Springer
107views Cryptology» more  FC 1997»
13 years 11 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
CCS
2004
ACM
14 years 27 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
WIOPT
2010
IEEE
13 years 5 months ago
A contracts-based approach for spectrum sharing among cognitive radios
Abstract—Development of dynamic spectrum access and allocation techniques recently have made feasible the vision of cognitive radio systems. However, a fundamental question arise...
Dileep M. Kalathil, Rahul Jain
SAC
2006
ACM
14 years 1 months ago
Distributed context management in a mobility and adaptation enabling middleware (MADAM)
CT As computing devices are getting smaller, we tend to bring them everywhere. Consequently the operating conditions of the devices are constantly changing (e.g. changing user requ...
Marius Mikalsen, Nearchos Paspallis, Jacqueline Fl...
AOSD
2005
ACM
14 years 1 months ago
Role-based refactoring of crosscutting concerns
Improving the structure of code can help developers work with a software system more efficiently and more consistently. To aid developers in re-structuring the implementation of c...
Jan Hannemann, Gail C. Murphy, Gregor Kiczales