Sciweavers

1845 search results - page 312 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
ICICS
2005
Springer
15 years 6 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
CCS
2009
ACM
15 years 6 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CHI
2003
ACM
16 years 1 months ago
The digital set-top box as a virtual channel provider
This research is based on the realization that the desktop computing paradigm is not appropriate for television, because it is adapted to fundamentally different user aspirations ...
Konstantinos Chorianopoulos
NOSSDAV
2010
Springer
14 years 11 months ago
Designing a tit-for-tat based peer-to-peer video-on-demand system
Video-on-demand (VoD) is a next-generation Internet application of increasing interest allowing users to start watching a movie almost instantaneously by downloading the video on-...
Kévin Huguenin, Anne-Marie Kermarrec, Vivek...
CHI
2011
ACM
14 years 5 months ago
Knowing funny: genre perception and categorization in social video sharing
Categorization of online videos is often treated as a tag suggestion task; tags can be generated by individuals or by machine classification. In this paper, we suggest categoriza...
Jude Yew, David A. Shamma, Elizabeth F. Churchill