Sciweavers

1116 search results - page 156 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CHI
2005
ACM
14 years 8 months ago
EyeWindows: evaluation of eye-controlled zooming windows for focus selection
In this paper, we present an attentive windowing technique that uses eye tracking, rather than manual pointing, for focus window selection. We evaluated the performance of 4 focus...
David Fono, Roel Vertegaal
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
14 years 1 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
13 years 12 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
CLUSTER
2002
IEEE
13 years 7 months ago
File and Object Replication in Data Grids
Data replication is a key issue in a Data Grid and can be managed in different ways and at different levels of granularity: for example, at the file level or object level. In the ...
Heinz Stockinger, Asad Samar, Koen Holtman, Willia...