Sciweavers

1663 search results - page 3 / 333
» Computer Security in the Real World
Sort
View
UIST
1995
ACM
14 years 2 months ago
The World Through the Computer: Computer Augmented Interaction with Real World Environments
Current user interface techniques such as WIMP or the desktop metaphor do not support real world tasks, because the focus of these user interfaces is only on human–computer inte...
Jun Rekimoto, Katashi Nagao
IH
2001
Springer
14 years 3 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
CCGRID
2008
IEEE
14 years 5 months ago
Peer-to-Peer Desktop Grids in the Real World: The ShareGrid Project
ShareGrid is a peer-to-peer desktop grid aimed at satisfying the computing needs of the small research laboratories located in the Piedmont area in Northern Italy. ShareGrid adopt...
Cosimo Anglano, Massimo Canonico, Marco Guazzone, ...
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
14 years 22 days ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
JSSPP
2005
Springer
14 years 4 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin