Sciweavers

12194 search results - page 91 / 2439
» cans 2010
Sort
View
RFIDSEC
2010
13 years 8 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
WOTE
2010
13 years 8 months ago
Aperio: High Integrity Elections for Developing Countries
This article presents an ‘end-to-end’ integrity verification mechanism for use in minimally equipped secret paper-ballot election environments. The scheme presented in this pa...
Aleksander Essex, Jeremy Clark, Carlisle Adams
CNSM
2010
13 years 8 months ago
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
Amy Fedyk, Michael Atighetchi, Partha Pratim Pal
CNSM
2010
13 years 8 months ago
Virtual platform support for QoS management in IMS based multiple provider networks
1 -- Design of a Set-top Box (STB) is presented to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own mu...
Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-...
SERVICEWAVE
2010
13 years 7 months ago
Self-adapting Applications Based on QA Requirements in the Cloud Using Market-Based Heuristics
There are several situations where applications in the cloud need to self-manage their quality attributes (QA). We posit that selfadaptation can be achieved through a market-based ...
Vivek Nallur, Rami Bahsoon