Sciweavers

1688 search results - page 304 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
131
Voted
NSDI
2007
15 years 4 months ago
The Flexlab Approach to Realistic Evaluation of Networked Systems
Networked systems are often evaluated on overlay testbeds such as PlanetLab and emulation testbeds such as Emulab. Emulation testbeds give users great control over the host and ne...
Robert Ricci, Jonathon Duerig, Pramod Sanaga, Dani...
CANDC
2007
ACM
15 years 6 months ago
Eye-balls: juggling with the virtual
The authors will introduce and demonstrate a novel computer vision based system for augmented performance. Unlike previous systems, which have primarily focused on `high art'...
Joe Marshall, Steve Benford, Tony P. Pridmore
CCS
2007
ACM
15 years 8 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
118
Voted
ECRIME
2007
15 years 5 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
138
Voted
KI
2010
Springer
15 years 11 days ago
CoTeSys - Cognition for Technical Systems
The COTESYS cluster of excellence1 investigates cognition for technical systems such as vehicles, robots, and factories. Cognitive technical systems (CTS) are information processi...
Martin Buss, Michael Beetz