Sciweavers

2648 search results - page 481 / 530
» Human Factors In Computer Security
Sort
View
MOBISYS
2010
ACM
15 years 4 days ago
Growing an organic indoor location system
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. ...
Jun-geun Park, Ben Charrow, Dorothy Curtis, Jonath...
IHI
2010
142views Healthcare» more  IHI 2010»
14 years 4 months ago
Exploring the use of technology in healthcare spaces and its impact on empathic communication
As computing technologies in examination rooms become a more pervasive and dominant part of the healthcare experience, those technologies can disrupt the flow of information and e...
Amanda Fonville, Eun Kyoung Choe, Susan Oldham, Ju...
PAM
2010
Springer
15 years 4 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
ICDCS
2010
IEEE
15 years 1 months ago
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing
—Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band...
Qi Dong, Donggang Liu
ASIACRYPT
2001
Springer
15 years 1 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois