Secure access module

Known as: SAM card, Sam 
A Secure Access Module (or Secure Application Module) is based on SmartCard Integrated circuits and is used to enhance the security and cryptography… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1966-2016
02419662016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Effective Space Asset Management is one key to addressing the ever-growing issue of space congestion. It is imperative that… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2010
2010
Agent-Based Models (ABMs) can produce large volumes of textual output, often in the range of hundreds of gigabytes. To understand… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2009
2009
One way to detect and thwart a network attack is to compare each incoming packet with predefined patterns, also called an attack… (More)
  • table 1
  • figure 5
  • figure 6
  • table 2
Is this relevant?
2006
2006
Identity protection and privacy became increasingly important in network communications; especially in wireless LAN. In this… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2006
2006
For army, the mobility of an entire communication network is desirable. A large mobile communication network inevitably involves… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
We propose an architecture for self-adjusting and self-healing atomic memory in highly dynamic systems exploiting peer-to-peer… (More)
  • figure 1
Is this relevant?
2004
2004
Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2002
2002
In heterogeneous networks such as today’s Internet, the differentiated services architecture promises to provide QoS guarantees… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1996
1996
This paper describes a new method for providing transparent fault tolerance for parallel applications on a network of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1994
1994
This report describes a system called SAM that simplifies the task of programming machines with distributed address spaces by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?