Sciweavers

348 search results - page 26 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
138
Voted
ICCHP
2004
Springer
15 years 7 months ago
Web Adaptation of Learning Objects for Special Access WALOSA
Diversity in learning style represents an obstacle teachers have to deal with. In the case of pupils with visual perception troubles, teachers cannot propose to students with diffi...
Carole Salis, Cristian Lai, Claude Moulin
127
Voted
PERCOM
2008
ACM
16 years 1 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
135
Voted
ESORICS
2005
Springer
15 years 7 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
92
Voted
OZCHI
2005
ACM
15 years 7 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
COORDINATION
2009
Springer
16 years 2 months ago
Hop, a Fast Server for the Diffuse Web
The diffuse Web is an alternative way of using the Web 2.0 infrastructure for building personal diffuse applications. Systems that let users tune the temperature of their house wit...
Manuel Serrano