Sciweavers

24529 search results - page 153 / 4906
» Computing on Authenticated Data
Sort
View
ICWN
2004
15 years 4 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
WWW
2008
ACM
16 years 3 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
PERCOM
2009
ACM
15 years 9 months ago
uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications
Abstract—The proliferation of accelerometers on consumer electronics has brought an opportunity for interaction based on gestures or physical manipulation of the devices. We pres...
Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramas...
ESCIENCE
2006
IEEE
15 years 9 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...
NSPW
2003
ACM
15 years 8 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin