skip to main content
Refinado por: Nome da Publicação: Lecture Notes in Computer Science remover Nome da Publicação: Security In Pervasive Computing remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Enlisting Hardware Architecture to Thwart Malicious Code Injection
Material Type:
Artigo
Adicionar ao Meu Espaço

Enlisting Hardware Architecture to Thwart Malicious Code Injection

Lee, Ruby B. ; Karig, David K. ; McGregor, John P. ; Shi, Zhijie

Lecture notes in computer science, 2004, p.237-252 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
Material Type:
Artigo
Adicionar ao Meu Espaço

Optimized RISC Architecture for Multiple-Precision Modular Arithmetic

Großschädl, Johann ; Kamendje, Guy-Armand

Lecture notes in computer science, 2004, p.253-270 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

3
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
Material Type:
Artigo
Adicionar ao Meu Espaço

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Weis, Stephen A. ; Sarma, Sanjay E. ; Rivest, Ronald L. ; Engels, Daniel W.

Lecture notes in computer science, 2004, p.201-212 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

4
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
Material Type:
Artigo
Adicionar ao Meu Espaço

A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks

Gruteser, Marco ; Grunwald, Dirk

Lecture notes in computer science, 2004, p.10-24 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

5
The Importance of High Assurance Security in Pervasive Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

The Importance of High Assurance Security in Pervasive Computing

Karger, Paul A.

Security in Pervasive Computing, p.9-9 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

6
Authentication for Pervasive Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Authentication for Pervasive Computing

Creese, Sadie ; Goldsmith, Michael ; Roscoe, Bill ; Zakiuddin, Irfan

Lecture notes in computer science, 2004, p.116-129 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

7
The Age of Pervasive Computing – Everything Smart, Everything Connected?
Material Type:
Artigo
Adicionar ao Meu Espaço

The Age of Pervasive Computing – Everything Smart, Everything Connected?

Mattern, Friedemann

Security in Pervasive Computing, p.1-1 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

8
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
Material Type:
Artigo
Adicionar ao Meu Espaço

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

Robinson, Philip ; Beigl, Michael

Lecture notes in computer science, 2004, p.157-172 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

9
Protecting Access to People Location Information
Material Type:
Artigo
Adicionar ao Meu Espaço

Protecting Access to People Location Information

Hengartner, Urs ; Steenkiste, Peter

Lecture notes in computer science, 2004, p.25-38 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

10
Enforcing Security Policies via Types
Material Type:
Artigo
Adicionar ao Meu Espaço

Enforcing Security Policies via Types

Gorla, Daniele ; Pugliese, Rosario

Lecture notes in computer science, 2004, p.86-100 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

Buscando em bases de dados remotas. Favor aguardar.