Sciweavers

1353 search results - page 50 / 271
» Securing Current and Future Process Control Systems
Sort
View
JCM
2006
112views more  JCM 2006»
15 years 2 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
111
Voted
ATAL
2005
Springer
15 years 8 months ago
PowerMatcher: multiagent control in the electricity infrastructure
Different driving forces push the electricity production towards decentralization. As a result, the current electricity infrastructure is expected to evolve into a network of netw...
J. K. Kok, C. J. Warmer, I. G. Kamphuis
CASES
2006
ACM
15 years 8 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
97
Voted
ACSAC
2006
IEEE
15 years 8 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
CSFW
1992
IEEE
15 years 6 months ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens