Sciweavers

1663 search results - page 49 / 333
» Computer Security in the Real World
Sort
View
CG
1999
Springer
13 years 8 months ago
Occlusion in collaborative augmented environments
Augmented environments superimpose computer enhancements on the real world. Such augmented environments are well suited for collaboration of multiple users. To improve the quality...
Anton L. Fuhrmann, Gerd Hesina, François Fa...
EVOW
2006
Springer
14 years 14 days ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
IJSN
2007
94views more  IJSN 2007»
13 years 8 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
CHI
2008
ACM
14 years 9 months ago
Acceptance of augmented reality instructions in a real work setting
The differences between Augmented Reality (AR) systems and computer display based systems create a need for a different approach to the design and development of AR systems. To un...
Björn J. E. Johansson, Susanna Nilsson
SGAI
2007
Springer
14 years 2 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...