Sciweavers

1116 search results - page 111 / 224
» Secure Mediation: Requirements and Design
Sort
View
USS
2008
14 years 21 days ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
CASES
2005
ACM
14 years 10 days ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
IACR
2011
221views more  IACR 2011»
12 years 10 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
IE
2007
13 years 12 months ago
Speaking in character: using voice-over-IP to communicate within MMORPGs
While voice-over-IP has long been favoured as a communication medium by players of team-based online shooter games, it has recently also been appropriated by players of MMORPGs, a...
Greg Wadley, Martin R. Gibbs, Peter Benda
BMCBI
2008
84views more  BMCBI 2008»
13 years 10 months ago
Prediction of specificity-determining residues for small-molecule kinase inhibitors
Background: Designing small-molecule kinase inhibitors with desirable selectivity profiles is a major challenge in drug discovery. A high-throughput screen for inhibitors of a giv...
Daniel R. Caffrey, Elizabeth A. Lunney, Deborah J....