Sciweavers

897 search results - page 87 / 180
» Security Requirements for RFID Computing Systems
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
SPAA
2003
ACM
14 years 1 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
ITICSE
2009
ACM
14 years 2 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
CAI
2002
Springer
13 years 8 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston
ACSAC
2010
IEEE
13 years 6 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...