Sciweavers

897 search results - page 150 / 180
» Protecting Information Sharing in Distributed Collaborative ...
Sort
View
IDTRUST
2010
ACM
14 years 14 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
INFOCOM
2011
IEEE
12 years 11 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ACMDIS
2010
ACM
13 years 7 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
IROS
2009
IEEE
150views Robotics» more  IROS 2009»
14 years 2 months ago
AWE: A robotic wall and reconfigurable desk supporting working life in a digital society
—“AWE” is a programmable “Animated Work Environment” supporting everyday human activities, at home, work and school, in an increasingly digital society. AWE features a no...
Keith Evan Green, Ian D. Walker, Leo J. Gugerty, J...