Sciweavers

331 search results - page 25 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
145
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
ISCAS
1999
IEEE
206views Hardware» more  ISCAS 1999»
15 years 6 months ago
Transimpedance amplifier with differential photodiode current sensing
This paper presents a balanced receiver structure suitable for wireless infrared data communications. The receiver provides a fixed photodiode bias voltage with the use of a regul...
B. Zand, K. Phang, D. A. Johns
103
Voted
SPW
2004
Springer
15 years 7 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
JPDC
2006
111views more  JPDC 2006»
15 years 2 months ago
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Irregular parallel algorithms pose a significant challenge for achieving high performance because of the difficulty predicting memory access patterns or execution paths. Within an...
Guojing Cong, David A. Bader
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...