Sciweavers

4305 search results - page 254 / 861
» Analysing Protocol Implementations
Sort
View
IUI
2000
ACM
14 years 2 months ago
More than just a pretty face: affordances of embodiment
Prior research into embodied interface agents has found that users like them and find them engaging. In this paper, we argue that embodiment can serve an even stronger function if...
Justine Cassell, Timothy W. Bickmore, Hannes H&oum...
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 1 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
FC
2000
Springer
83views Cryptology» more  FC 2000»
14 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
INFOCOM
1995
IEEE
14 years 1 months ago
Measuring the Performance of Parallel Message-Based Process Architectures
Message-based process architectures are widely regarded as an effective method for structuring parallel protocol processing on shared memory multi-processor platforms. A message-b...
Douglas C. Schmidt, Tatsuya Suda
SEC
2001
13 years 11 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...