Sciweavers

1597 search results - page 128 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 8 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
MOBISYS
2009
ACM
14 years 9 months ago
Predictive methods for improved vehicular WiFi access
With the proliferation of WiFi technology, many WiFi networks are accessible from vehicles on the road making vehicular WiFi access realistic. However, several challenges exist: l...
Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir...
HOTOS
2003
IEEE
14 years 2 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
MOBICOM
2006
ACM
14 years 3 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...
KES
2007
Springer
14 years 3 months ago
Practical Environment for Realizing Augmented Classroom with Wireless Digital Pens
We have developed AirTransNote, a student notes sharing system to facilitate collaborative and interactive learning in a regular lecture at conventional classrooms. Our former syst...
Motoki Miura, Susumu Kunifuji, Yasuyuki Sakamoto