Sciweavers

5252 search results - page 929 / 1051
» Logic in Access Control
Sort
View
149
Voted
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 10 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
104
Voted
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
15 years 10 months ago
In-vivo pan/tilt endoscope with integrated light source
— Endoscopic imaging is still dominated by the paradigm of pushing long sticks into small openings. This approach has a number of limitations for minimal access surgery, such as ...
Tie Hu, Peter K. Allen, Dennis L. Fowler
142
Voted
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 10 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...
151
Voted
CCS
2007
ACM
15 years 10 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
147
Voted
OTM
2007
Springer
15 years 10 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...