Sciweavers

1663 search results - page 65 / 333
» Computer Security in the Real World
Sort
View
ACMACE
2006
ACM
14 years 2 months ago
How real should virtual characters be?
In recent years 3D virtual characters have become more common in desktop interfaces, particularly in gaming and entertainment applications. In this paper we describe how augmented...
Daniel Wagner, Mark Billinghurst, Dieter Schmalsti...
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 10 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
ICYCS
2008
IEEE
14 years 3 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
RT
2005
Springer
14 years 2 months ago
Real Illumination from Virtual Environments
We introduce a method for actively controlling the illumination in a room so that it is consistent with a virtual world. In combination with a high dynamic range display, the syst...
Abhijeet Ghosh, Matthew Trentacoste, Helge Seetzen...