Sciweavers

859 search results - page 76 / 172
» Security for Key Management Interfaces
Sort
View
CCS
2001
ACM
14 years 2 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
ICCS
2009
Springer
14 years 2 months ago
Interactive Control over a Programmable Computer Network Using a Multi-touch Surface
This article introduces the Interactive Network concept and describes the design and implementation of the first prototype. In an Interactive Network humans become an integral par...
Rudolf J. Strijkers, Laurence Muller, Mihai Criste...
ECAI
2004
Springer
14 years 3 months ago
The Use of Temporal Reasoning and Management of Complex Events in Smart Homes
Technological advancements have and will revolutionise the support offered to persons in their home environment. As the population continues to grow and in addition the percentage ...
Juan Carlos Augusto, Chris D. Nugent
SEKE
2007
Springer
14 years 4 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
SOUPS
2006
ACM
14 years 4 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten