Sciweavers

557 search results - page 64 / 112
» Two experiences designing for effective security
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 19 days ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
MOBIHOC
2008
ACM
14 years 8 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
MOBICOM
2000
ACM
14 years 1 months ago
An end-to-end approach to host mobility
We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Exi...
Alex C. Snoeren, Hari Balakrishnan
BCSHCI
2008
13 years 10 months ago
Assessing the benefits of multimodal feedback on dual-task performance under demanding conditions
The last few years have seen the release of an increasing number of new IT-related devices into the marketplace that have started to utilize tactile feedback. These include those ...
Ju-Hwan Lee, Charles Spence
SOSP
2005
ACM
14 years 5 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...