Sciweavers

1150 search results - page 182 / 230
» Beacon Based Authentication
Sort
View
PERVASIVE
2006
Springer
15 years 2 months ago
Displays in the Wild: Understanding the Dynamics and Evolution of a Display Ecology
Large interactive display systems are becoming increasingly pervasive, but most have been studied in isolation, rather than in the context of other technologies in the environment....
Elaine M. Huang, Elizabeth D. Mynatt, Jay P. Trimb...
TCS
2008
15 years 2 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven
JCS
2007
103views more  JCS 2007»
15 years 2 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
INFOCOM
2010
IEEE
15 years 28 days ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
145
Voted
CCS
2010
ACM
15 years 14 days ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin