Sciweavers

1018 search results - page 83 / 204
» Remote User Authentication Using Public Information
Sort
View
DBSEC
2003
137views Database» more  DBSEC 2003»
13 years 9 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...
AAAI
2004
13 years 9 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
ICRA
2002
IEEE
73views Robotics» more  ICRA 2002»
14 years 1 months ago
Internet Control of Personal Robot between KAIST and UC Davis
This paper describes the implementation of an internet-based personal robot with three control modes, and experimental results on the remote control between KAIST, Korea and UC Da...
Kuk-Hyun Han, Yong-Jae Kim, Jong-Hwan Kim, Steve H...
GI
2004
Springer
14 years 1 months ago
Process-Based Integration of Heterogeneous Information Sources
: The number of information sources in the Web is growing day by day with a tremendous speed. At the same time, users tend to manage more and more tasks electronically, thereby usi...
Sudhir Agarwal, Peter Haase
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...