Sciweavers

24529 search results - page 88 / 4906
» Computing on Authenticated Data
Sort
View
MIDDLEWARE
2005
Springer
14 years 3 months ago
A new two-message authentication protocol for RFID sensor networks
Ê Ó Ö ÕÙ Ò Ý Á ÒØ Ø ÓÒ ´Ê Á µ Ø ÒÓÐÓ Ý × Ñ ¹ Ø Ó ØÓ Ö ÑÓØ ÐÝ ×ØÓÖ Ò Ö ØÖ Ú Ø Ù× Ò ×Ñ ÐÐ Ñ ¹ ÖÓ Ô ÐÐ Ø Ê Á Ø ...
Selma Boumerdassi, Papa Kane Diop, Éric Ren...
CHI
2008
ACM
14 years 10 months ago
WallCology: designing interaction affordances for learner engagement in authentic science inquiry
The broadening array of technologies available to support the design of classroom activity has the potential to reshape science learning in schools. This paper presents a ubiquito...
Brenda López Silva, Brian Uphoff, Darshan B...
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 10 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
CHI
2010
ACM
14 years 4 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
DEBS
2010
ACM
13 years 10 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...