Sciweavers

367 search results - page 29 / 74
» Security Design in Online Games
Sort
View
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
WWW
2005
ACM
14 years 1 months ago
Shared lexicon for distributed annotations on the Web
The interoperability among distributed and autonomous systems is the ultimate challenge facing the semantic web. Heterogeneity of data representation is the main source of problem...
Paolo Avesani, Marco Cova
ICALT
2008
IEEE
14 years 2 months ago
Multisensory Games for Dyslexic Children
A significant problem faced by dyslexic children is a lack of learning technologies designed to help children learn in settings when there is no personal teaching assistance. This...
James Ohene-Djan, Rahima Begum
CCS
2004
ACM
13 years 11 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
DSN
2004
IEEE
13 years 11 months ago
Secure Distributed DNS
A correctly working Domain Name System (DNS) is essential for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a w...
Christian Cachin, Asad Samar