Sciweavers

582 search results - page 97 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
KBSE
2007
IEEE
14 years 1 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ACSAC
2007
IEEE
14 years 2 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
CSUR
2010
373views more  CSUR 2010»
13 years 5 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
CRITICAL
2005
13 years 9 months ago
Involving non-players in pervasive games
In traditional computer games, it is not uncommon for the game world to be inhabited by numerous computergenerated characters, Non-Player Characters (NPCs). In pervasive games, pl...
Jenny Niemi, Susanna Sawano, Annika Waern