Sciweavers

859 search results - page 151 / 172
» Security for Key Management Interfaces
Sort
View
SIGUCCS
2004
ACM
14 years 3 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
WPES
2005
ACM
14 years 3 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
GROUP
2005
ACM
14 years 3 months ago
An optimization approach to group coupling in heterogeneous collaborative systems
Recent proliferation of computing devices has brought attention to heterogeneous collaborative systems, where key challenges arise from the resource limitations and disparities. S...
Carlos D. Correa, Ivan Marsic
HPDC
2007
IEEE
14 years 4 months ago
Direct-pNFS: scalable, transparent, and versatile access to parallel file systems
Grid computations require global access to massive data stores. To meet this need, the GridNFS project aims to provide scalable, high-performance, transparent, and secure wide-are...
Dean Hildebrand, Peter Honeyman
CCS
2007
ACM
14 years 1 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels