Sciweavers

232 search results - page 27 / 47
» On the use of one-way chain based authentication protocols i...
Sort
View
AGENTS
1998
Springer
14 years 21 days ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus
ICC
2007
IEEE
14 years 2 months ago
Link Error Prediction in Wireless Communication Systems with Quality Based Power Control
— The quality of end-to-end services over wireless communication networks highly depends on the error characteristics of the wireless links. By utilizing the link error character...
Wolfgang Karner, Olivia Nemethova, Markus Rupp
HPCA
2005
IEEE
14 years 8 months ago
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of a...
Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhan...
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 18 days ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao
ESORICS
2012
Springer
11 years 10 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...