Sciweavers

3815 search results - page 68 / 763
» An Implementation of Session Types
Sort
View
126
Voted
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 8 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
106
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Any Source Implicit Multicast (ASIMcast)
Abstract— This paper proposes the ASIMcast (Any-Source Implicit Multicast) protocol which builds a bidirectional tree for routing of multicast traffic. ASIMcast includes feature...
Laurent Nadeau, Tricha Anjali
124
Voted
ICAC
2005
IEEE
15 years 8 months ago
Message from the General Chairs and Program Chairs
Track 2 - Modeling and Abstraction of Services Process Session Chair: Dynamic Service Invocation Control in Service Composition Environments (SCC2010-2004) ...........................
110
Voted
DFT
2003
IEEE
100views VLSI» more  DFT 2003»
15 years 7 months ago
Scan-Based BIST Diagnosis Using an Embedded Processor
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Kedarnath J. Balakrishnan, Nur A. Touba
WETICE
2002
IEEE
15 years 7 months ago
A Flexible Architecture for Collaborative Browsing
Collaborative Browsing is a new and promising research area whose purpose is to provide new collaboration schemes among users browsing the Web. To become an efficient collaboratio...
Guillermo de Jesús Hoyos-Rivera, Roberta Li...