Sciweavers

1597 search results - page 232 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Reconciling software configuration management and product data management
Product Data Management (PDM) and Software Configuration Management (SCM) are the disciplines of building and controlling the evolution of a complex artifacts; either physical or ...
Germán Vega, Jacky Estublier
EUROCRYPT
2011
Springer
13 years 15 days ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
WIMOB
2009
IEEE
14 years 3 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
SEC
2003
13 years 10 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
DEBU
2007
75views more  DEBU 2007»
13 years 9 months ago
Rethinking Full-Text Search for Multi-lingual Databases
Textual fields are commonly used in databases and applications to capture details that are difficult to formalize—comments, notes, and product descriptions. With the rise of t...
Jeffrey S. Sorensen, Salim Roukos