Sciweavers

495 search results - page 63 / 99
» Signed quorum systems
Sort
View
133
Voted
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 10 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
123
Voted
CCS
2001
ACM
15 years 8 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
127
Voted
ASSETS
2010
ACM
15 years 1 months ago
Iwalk: a lightweight navigation system for low-vision users
Smart phones typically support a range of GPS-enabled navigation services. However, most navigation services on smart phones are of limited use to people with visual disabilities....
Amanda J. Stent, Shiri Azenkot, Ben Stern
155
Voted
PERVASIVE
2004
Springer
15 years 9 months ago
Recognizing Workshop Activity Using Body Worn Microphones and Accelerometers
Most gesture recognition systems analyze gestures intended for communication (e.g. sign language) or for command (e.g. navigation in a virtual world). We attempt instead to recogn...
Paul Lukowicz, Jamie A. Ward, Holger Junker, Mathi...
116
Voted
HUMAN
2003
Springer
15 years 9 months ago
Peer-to-Peer Money: Free Currency over the Internet
This paper proposes a resilient, alternative monetary system on the Internet called i-WAT, based on WAT System[1] which uses a form of promissory note as the medium of exchanging g...
Kenji Saito