Sciweavers

1949 search results - page 127 / 390
» Protective Interface Specifications
Sort
View
IDTRUST
2009
ACM
14 years 5 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
GLOBECOM
2009
IEEE
14 years 4 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Next Generation of Monitoring and Control Systems Using Synchronized Sampling Technology and Multifunctional IEDs
This paper discusses implementation of the next generation solution for power system control and monitoring. The new design is based on the use of synchronized sampling technology...
Mladen Kezunovic
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
14 years 4 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...