Sciweavers

3155 search results - page 88 / 631
» How Are You Doing
Sort
View
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
AGILEDC
2007
IEEE
14 years 2 months ago
How We Made Onsite Customer Work - An Extreme Success Story
The Agile Manifesto emphasizes customer collaboration over contract negotiation. No Extreme Programming practice embodies this more than onsite customer. This paper describes our ...
Michelle Williams, Jay Packlick, Rajeev Bellubbi, ...
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 1 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
TRUSTBUS
2007
Springer
14 years 1 months ago
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interope...
Detlef Hühnlein, Manuel Bach
ACMDIS
2006
ACM
14 years 1 months ago
How bodies matter: five themes for interaction design
Our physical bodies play a central role in shaping human experience in the world, understanding of the world, and interactions in the world. This paper draws on theories of embodi...
Scott R. Klemmer, Björn Hartmann, Leila Takay...