Sciweavers

4731 search results - page 134 / 947
» Securing Interactive Programs
Sort
View
MHCI
2009
Springer
14 years 3 months ago
Detecting physical shock by a mobile phone and its applications in security and emergency
In this paper, we propose a method for detecting physical shock by a mobile phone and its applications in security and emergency scenarios. We use acceleration signal provided by ...
Hamed Ketabdar
CASSIS
2004
Springer
14 years 2 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
CRYPTO
2000
Springer
184views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator ca...
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene ...
ECOOP
2008
Springer
13 years 10 months ago
An Extensible State Machine Pattern for Interactive Applications
Abstract. The state design pattern is the standard object-oriented programming idiom for implementing the state machine logic of interactive applications. While this pattern provid...
Brian Chin, Todd D. Millstein
UIALL
2004
Springer
14 years 2 months ago
Multimodal Interaction in Architectural Design Applications
In this paper we report on ongoing experiments with an advanced multimodal system for applications in architectural design. The system supports uninformed users in entering the rel...
Lou Boves, Andre Neumann, Louis Vuurpijl, Louis te...