Sciweavers

293 search results - page 32 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
VTC
2007
IEEE
14 years 1 months ago
Signaling Reduction in Idle Mode for Inter-Technology Mobility
— With the proliferation of air interface technologies, there are increasingly multi-mode user equipment devices (UEs) that can operate in more than one technology, although not ...
Suresh Kalyanasundaram, Vinod Ramachandran, Vijay ...
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
14 years 1 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
TVCG
2008
103views more  TVCG 2008»
13 years 7 months ago
Who Votes For What? A Visual Query Language for Opinion Data
Surveys and opinion polls are extremely popular in the media, especially in the months preceding a general election. However, the available tools for analyzing poll results often r...
Geoffrey M. Draper, Richard F. Riesenfeld
LISA
2007
13 years 10 months ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...