Sciweavers

134 search results - page 4 / 27
» Authentic Third-party Data Publication
Sort
View
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 1 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 21 days ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
WWW
2010
ACM
13 years 7 months ago
Web-based framework for spatiotemporal screen real estate management of interactive public displays
In this paper we present a web-based framework for spatiotemporal screen real estate management of interactive public displays. The framework facilitates dynamic partitioning of t...
Tomas Linden, Tommi Heikkinen, Timo Ojala, Hannu K...
CHI
2004
ACM
14 years 7 months ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...