Sciweavers

337 search results - page 19 / 68
» Managing the Health of Security Experiments
Sort
View
DRM
2003
Springer
14 years 3 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
14 years 3 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
WOWMOM
2009
ACM
125views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Mechanical modeling of bend sensors exploited to measure human joint movements
abstract Opening Remarks (9.00 – 9.15) Paul Lukowicz Keynote Lecture (9.15 – 10.15) Wearable Physiological Sensing Systems: Issues and Trade-offs in Real World Deployments Pres...
Giovanni Saggio, Paolo Bisegna, Giuseppe Latessa, ...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
RE
2007
Springer
14 years 3 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...