Sciweavers

SPW
2005
Springer
14 years 6 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
SPW
2005
Springer
14 years 6 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
SPW
2005
Springer
14 years 6 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
SPW
2005
Springer
14 years 6 months ago
Listen Too Closely and You May Be Confused
Eric Cronin, Micah Sherr, Matt Blaze
SPW
2005
Springer
14 years 6 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
SPW
2005
Springer
14 years 6 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
SPW
2005
Springer
14 years 6 months ago
Alice and Bob
John Gordon