Sciweavers

897 search results - page 15 / 180
» Security Requirements for RFID Computing Systems
Sort
View
PERCOM
2009
ACM
14 years 8 months ago
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
Abstract--The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the deve...
Vikram P. Munishwar, Shailendra Singh 0003, Christ...
PERCOM
2007
ACM
14 years 7 months ago
Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology
The idea of smart shelves or tables equipped with RFID technology has been around for some time now. There already are commercial products available, especially for retailing. All...
Steve Hinske
IEEEARES
2007
IEEE
14 years 2 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang
CSREAPSC
2006
13 years 9 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...