Sciweavers

1663 search results - page 44 / 333
» Computer Security in the Real World
Sort
View
MHCI
2005
Springer
14 years 1 months ago
Rolling, rotating and imagining in a virtual mobile world
New mobile devices can be difficult to use because they give users access to powerful computing devices through small interfaces, which typically have limited input facilities. On...
Lynne Baillie, Harald Kunczier, Hermann Anegg
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
14 years 2 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
CSCWD
2008
Springer
13 years 9 months ago
Educational technology for collaborative virtual environments
3D information systems for education must be investigated and adopted for a more involving form of learning. It is in this context that we propose the use of Second Life as an env...
Marcio Cunha, Alberto Barbosa Raposo, Hugo Fuks
IJISEC
2007
61views more  IJISEC 2007»
13 years 7 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
EMSOFT
2005
Springer
14 years 1 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander