Sciweavers

2347 search results - page 310 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
DSN
2007
IEEE
14 years 2 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...
ISORC
2006
IEEE
14 years 2 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue
EUROPKI
2004
Springer
14 years 1 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 1 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
IPPS
1999
IEEE
14 years 10 days ago
High Speed, High Capacity Bused Interconnects using Optical Slab Waveguides
In this paper we consider the use of optical slab waveguides as buses in a parallel computing environment. We show that slab buses can connect to many more elements than convention...
Martin Feldman, Ramachandran Vaidyanathan, Ahmed E...