Sciweavers

1018 search results - page 28 / 204
» Remote User Authentication Using Public Information
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
IPPS
2007
IEEE
15 years 6 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
CHI
2010
ACM
15 years 6 months ago
Worlds of information: designing for engagement at a public multi-touch display
In designing for engagement at a public multi-touch installation, we identified supporting multiple users and allowing for gradual discovery as challenges. In this paper, we prese...
Giulio Jacucci, Ann Morrison, Gabriela T. Richard,...
PROVSEC
2010
Springer
14 years 9 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CHI
2009
ACM
15 years 4 months ago
Exploring participatory performance to inform the design of collaborative public interfaces
We describe a new application of interactive participatory performance in interaction design. Our pragmatic strategy permits us to use performance as an investigatory tool in the ...
Robyn Taylor, Pierre Boulanger, Patrick Olivier, J...