Sciweavers

140 search results - page 24 / 28
» Extending Context Models for Privacy in Pervasive Computing ...
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
SIBGRAPI
2003
IEEE
14 years 27 days ago
A Sketch-Based Collaborative Design System
We present a system for collaborative conceptual design that allows users potentially located in geographically distant areas to cooperate by sketching, exploring and modifying the...
Zhe Fan, Ma Chi, Manuel M. Oliveira
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 28 days ago
A Self-Disclosure Model for Personal Health Information
The use of information technologies (IT) to collect personal health information is growing in popularity via computer-assisted interviewing and a wide variety of healthcare Web si...
Lotus E. Kam, William G. Chismar