Sciweavers

19003 search results - page 172 / 3801
» We Need Assurance!
Sort
View
FC
2003
Springer
111views Cryptology» more  FC 2003»
14 years 3 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
ISORC
2002
IEEE
14 years 3 months ago
Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN
The increasing use of wireless networks has necessitated the development of a wireless networking infrastructure that supports quality of service (QoS) for multimedia communicatio...
Husni Fahmi, Mudassir Latif, Basit Shafiq, Raymond...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 3 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ICSE
2010
IEEE-ACM
14 years 3 months ago
Advanced hands-on training for distributed and outsourced software engineering
Today’s software projects are often distributed across multiple locations. This distribution poses new challenges produced by the cooperation across different countries, times z...
Martin Nordio, Roman Mitin, Bertrand Meyer
CDC
2009
IEEE
127views Control Systems» more  CDC 2009»
14 years 3 months ago
A time-periodic Lyapunov approach for motion planning of controllable driftless systems on SU(n)
Abstract— For a right-invariant and controllable driftless system on SU(n), we consider a time-periodic reference trajectory along which the linearized control system generates s...
Hector Bessa Silveira, Paulo Sérgio Pereira...