Sciweavers

2363 search results - page 353 / 473
» How Secure is RFID
Sort
View
135
Voted
NSDI
2008
15 years 7 months ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan
WSC
2007
15 years 7 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
120
Voted
WSC
2008
15 years 7 months ago
A methodology for input data management in discrete event simulation projects
Discrete event simulation (DES) projects rely heavily on high input data quality. Therefore, the input data management process is very important and, thus, consumes an extensive a...
Anders Skoogh, Björn Johansson
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 7 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
CONEXT
2008
ACM
15 years 6 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar