Sciweavers

33 search results - page 7 / 7
» IC Activation and User Authentication for Security-Sensitive...
Sort
View
INTERACT
2003
13 years 6 months ago
Enticing People to Interact with Large Public Displays in Public Spaces
: Large displays are increasingly being placed in public places to support community and social activities. However, a major problem that has been observed with this new form of pu...
Harry Brignull, Yvonne Rogers
SRDS
2010
IEEE
13 years 2 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
EUROSYS
2006
ACM
14 years 2 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...