Sciweavers

1018 search results - page 124 / 204
» Remote User Authentication Using Public Information
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
SAC
2005
ACM
14 years 1 months ago
SELS: a secure e-mail list service
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
Himanshu Khurana, Adam J. Slagell, Rafael Bonilla
DEXAW
2003
IEEE
164views Database» more  DEXAW 2003»
14 years 1 months ago
Towards an Open Service Architecture for Data Mining on the Grid
Across a wide variety of fields, huge datasets are being collected and accumulated at a dramatical pace. The datasets addressed by individual applications are very often heteroge...
Peter Brezany, Jürgen Hofer, Alexander Wö...
ISWC
1998
IEEE
14 years 7 days ago
Speaking and Listening on the Run: Design for Wearable Audio Computing
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...
Nitin "Nick" Sawhney, Chris Schmandt
CHI
2010
ACM
14 years 2 months ago
MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector
MouseLight is a spatially-aware standalone mobile projector with the form factor of a mouse that can be used in combination with digital pens on paper. By interacting with the pro...
Hyunyoung Song, François Guimbretièr...