Sciweavers

2399 search results - page 116 / 480
» On Authentication between Human and Computer
Sort
View
159
Voted
EUROPKI
2006
Springer
15 years 7 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
135
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 5 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 5 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
AUIC
2000
IEEE
15 years 8 months ago
The Metaphor of the Face as an Interface for Communicating Non-Quantitative Information
In this paper we propose that a metaphor can be used to represent domains that are not easily quantifiable. The metaphor then can be used as an interface to communicate informatio...
Simeon J. Simoff, Fay Sudweeks
CG
2005
Springer
15 years 3 months ago
Computer Graphics education in different curricula: analysis and proposal for courses
This paper studies how Computer Graphics is taught and proposes a course on 2D Computer Graphics and Image Processing as an alternative to the traditional 3D Computer Graphics cou...
Eric Paquette