Sciweavers

2399 search results - page 146 / 480
» On Authentication between Human and Computer
Sort
View
ISWC
1999
IEEE
15 years 8 months ago
Asymmetries in Collaborative Wearable Interfaces
Communication asymmetries are inherent in collaborative dialogues between wearable computer and desktop users. This paper gives a definition and overview of what communication asy...
Mark Billinghurst, Simon Bee, Jerry Bowskill, Hiro...
ADHOCNOW
2010
Springer
15 years 5 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
DAC
2004
ACM
16 years 5 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...
MOBISYS
2011
ACM
14 years 7 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
PODC
2009
ACM
16 years 4 months ago
Brief announcement: global consistency can be easier than point-to-point communication
Global consistency or Byzantine Agreement (BA) and reliable point-to-point communication are two of the most important and well-studied problems in distributed computing. Informal...
Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piy...