Sciweavers

24529 search results - page 298 / 4906
» Computing on Authenticated Data
Sort
View
159
Voted
DOA
2000
159views more  DOA 2000»
15 years 5 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
PERVASIVE
2006
Springer
15 years 3 months ago
Displays in the Wild: Understanding the Dynamics and Evolution of a Display Ecology
Large interactive display systems are becoming increasingly pervasive, but most have been studied in isolation, rather than in the context of other technologies in the environment....
Elaine M. Huang, Elizabeth D. Mynatt, Jay P. Trimb...
130
Voted
TCS
2008
15 years 3 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven
DIMVA
2011
14 years 7 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
205
Voted
SAC
2011
ACM
14 years 6 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...