Sciweavers

JCS
2011
126views more  JCS 2011»
12 years 11 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
ECSCW
1997
13 years 6 months ago
Plans as Situated Action: An Activity Theory Approach to Workflow Systems
: Within the community of CSCW the notion and nature of workflow systems as prescriptions of human work has been debated and criticised. Based on the work of Suchman (1987) the not...
Jakob Bardram