Sciweavers

1293 search results - page 219 / 259
» The infrastructure problem in HCI
Sort
View
ISCI
2010
146views more  ISCI 2010»
13 years 5 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
WWW
2011
ACM
13 years 2 months ago
Towards liquid service oriented architectures
The advent of Cloud computing platforms, and the growing pervasiveness of Multicore processor architectures have revealed the inadequateness of traditional programming models base...
Daniele Bonetta, Cesare Pautasso
ACC
2011
65views more  ACC 2011»
12 years 8 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
HICSS
2012
IEEE
308views Biometrics» more  HICSS 2012»
12 years 3 months ago
Understanding Smart Cities: An Integrative Framework
Making a city “smart” is emerging as a strategy to mitigate the problems generated by the urban population growth and rapid urbanization. Yet little academic research has spar...
Hafedh Chourabi, Taewoo Nam, Shawn Walker, Jos&eac...
WMCSA
2012
IEEE
12 years 3 months ago
SpinLoc: spin once to know your location
The rapid growth of location-based applications has spurred extensive research on localization. Nonetheless, indoor localization remains an elusive problem mostly because the accu...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...