Sciweavers

310 search results - page 51 / 62
» The Smart Controller Workbench
Sort
View
CCS
2007
ACM
14 years 2 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
ISCAS
2006
IEEE
88views Hardware» more  ISCAS 2006»
14 years 1 months ago
SiP integration of intelligent, adaptive, self-sustaining power management solutions for portable applications
Abstract—Power management is an essential component of any electrical system, and nowadays a limiting factor in the miniaturization of portable electronic devices. Not only are t...
E. O. Torres, Min Chen, H. Pooya Forghani-zadeh, V...
UCS
2004
Springer
14 years 1 months ago
A Unified Application Service Model for ubiHome by Exploiting Intelligent Context-Awareness
Abstract. We propose a unified ubiHome application service model which provides user-centered services by exploiting intelligent context-awareness. Recently, most of research relat...
Yoosoo Oh, Woontack Woo
SP
2003
IEEE
14 years 1 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
ICDCSW
2002
IEEE
14 years 25 days ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...