Sciweavers

842 search results - page 69 / 169
» Open Implementation Design Guidelines
Sort
View
EUROCRYPT
2003
Springer
15 years 3 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
INFOCOM
2007
IEEE
15 years 4 months ago
Realistic Sensing Area Modeling
—Despite the well-known fact that sensing patterns in reality are highly irregular, researchers continue to develop protocols with simplifying assumptions about the sensing. For ...
Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
IPCCC
2006
IEEE
15 years 3 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 3 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
15 years 2 months ago
A Combination Measurement for Studying Disorientation
The disorientation problem has been known to exist on hypertext and hypermedia systems. Various approaches have also been recommended and implemented in order to eliminate or redu...
Noor F. M. Yatim