Sciweavers

293 search results - page 13 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
CIKM
2008
Springer
13 years 9 months ago
Social navigation and annotation for electronic books
Modern efforts on digitizing electronic books focus on preserving authentic "spatial" representation of the original sources. The new format requires new tools to help u...
Jae-Kyung Kim, Rosta Farzan, Peter Brusilovsky
CHI
2004
ACM
14 years 8 months ago
Putting the users center stage: role playing and low-fi prototyping enable end users to design mobile systems
This paper sums up lessons learned from a sequence of cooperative design workshops where end users were enabled to design mobile systems through scenario building, role playing, a...
Dag Svanaes, Gry Seland
WISEC
2009
ACM
14 years 2 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
CHI
2009
ACM
14 years 8 months ago
User-created forms as an effective method of human-agent communication
A key challenge for mixed-initiative systems is to create a shared understanding of the task between human and agent. To address this challenge, we created a mixed-initiative inte...
John Zimmerman, Kathryn Rivard, Ian Hargraves, Ant...