Sciweavers

377 search results - page 51 / 76
» Factoring by Electronic Mail
Sort
View
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
CHES
2009
Springer
141views Cryptology» more  CHES 2009»
14 years 9 months ago
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90's, Boneh, DeMillo and Lipton [6] introduced fault-based attacks...
Jean-Sébastien Coron, Antoine Joux, Ilya Ki...
GROUP
2003
ACM
14 years 2 months ago
How people use orientation on tables: comprehension, coordination and communication
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...
JAMIA
2010
115views more  JAMIA 2010»
13 years 3 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
TEI
2012
ACM
285views Hardware» more  TEI 2012»
12 years 4 months ago
Sketch-a-TUI: low cost prototyping of tangible interactions using cardboard and conductive ink
Graspable tangibles are now being explored on the current generation of capacitive touch surfaces, such as the iPad and the Android tablet. Because the size and form factor is rel...
Alexander Wiethoff, Hanna Schneider, Michael Rohs,...