Sciweavers

401 search results - page 3 / 81
» Security and User Guidelines for the Design of the Future Ne...
Sort
View
MSE
2003
IEEE
100views Hardware» more  MSE 2003»
14 years 22 days ago
A System Design and Rapid Prototyping of Wearable Computers Course
This paper describes a custom design approach as applied to power management in an innovative course on rapid prototyping of computer systems at Carnegie Mellon. We emphasize the ...
Asim Smailagic, Daniel P. Siewiorek, Lu Luo
HUC
2009
Springer
14 years 2 days ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
ACISP
2003
Springer
14 years 21 days ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell
VR
2007
IEEE
195views Virtual Reality» more  VR 2007»
14 years 1 months ago
Active Text Drawing Styles for Outdoor Augmented Reality: A User-Based Study and Design Implications
A challenge in presenting augmenting information in outdoor augmented reality (AR) settings lies in the broad range of uncontrollable environmental conditions that may be present,...
Joseph L. Gabbard, J. Edward Swan II, Deborah Hix,...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
13 years 11 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon