Sciweavers

461 search results - page 48 / 93
» Protecting Transportation Infrastructure
Sort
View
IADIS
2004
13 years 11 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
CMS
2001
119views Communications» more  CMS 2001»
13 years 11 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 10 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
ATAL
2011
Springer
12 years 10 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...

Publication
317views
15 years 8 months ago
A Detailed Analysis of How an Urban Trail System Affects the Travel of Cyclists
Transportation specialists, urban planners, and public health officials have been steadfast in encouraging active modes of transportation over the past decades. Conventional thin...
Kevin J. Krizek, Ahmed El-Geneidy, Kristin Thompso...