Sciweavers

2275 search results - page 261 / 455
» A Deployment System for Pervasive Computing
Sort
View
128
Voted
CCS
2007
ACM
15 years 11 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
15 years 11 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
TELETRAFFIC
2007
Springer
15 years 10 months ago
Video-on-Demand Server Selection and Placement
Abstract. Large-scale Video-on-Demand (VoD) systems with high storage and high bandwidth requirements need a substantial amount of resources to store, distribute and transport all ...
Frederic Thouin, Mark Coates
ICDCS
2005
IEEE
15 years 10 months ago
Location Estimation in Ad Hoc Networks with Directional Antennas
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for lo...
Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Ya...
APNOMS
2006
Springer
15 years 8 months ago
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework i...
Dong-Hui Kim, Jae-Oh Lee