Sciweavers

1018 search results - page 107 / 204
» Remote User Authentication Using Public Information
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
GROUP
2003
ACM
14 years 1 months ago
Using cursor prediction to smooth telepointer jitter
Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awa...
Carl Gutwin, Jeff Dyck, Jennifer Burkitt
DCOSS
2008
Springer
13 years 9 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
AAAIDEA
2005
IEEE
14 years 1 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
DC
2001
13 years 9 months ago
The use of Metadata in Denmark
A wide range of metadata projects in Denmark over the last 4-5 years are described. A new Danish legal deposit act in 1997 facilitated cooperation in the creation of a common appl...
Leif Andresen