Sciweavers

293 search results - page 40 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
FAC
2007
128views more  FAC 2007»
13 years 7 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
MSWIM
2005
ACM
14 years 1 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
ICMCS
2000
IEEE
84views Multimedia» more  ICMCS 2000»
14 years 1 days ago
Multi-modal Interaction in the Age of Information Appliances
The coming millenium will be characterized by the availability of multiple information appliances that make ubiquitous information access an accepted fact of life. The ability to ...
Stéphane H. Maes, T. V. Raman
IADIS
2004
13 years 9 months ago
Learning with Technology: The Way we Think in the Digital ERA
Operating modern digital environments, as computer software and digital instruments require users to master a large variety of cognitive, motor, sociological, and emotional skills...
Yoram Eshet
VTC
2007
IEEE
14 years 1 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer