Sciweavers

12478 search results - page 229 / 2496
» Secure Interaction Design
Sort
View
AMC
2005
116views more  AMC 2005»
15 years 4 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
NORDSEC
2009
Springer
15 years 8 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas
INTERACT
2003
15 years 5 months ago
Layering a Minimal Interface
: This paper reports on a software tutorial designed according to minimalist principles. The design extends minimalism beyond paper-based instructions to computer-based interface, ...
Frank Vetere, Steve Howard
SDMW
2005
Springer
15 years 9 months ago
XML Security in the Next Generation Optical Disc Context
The Extensible Markup Language (XML) is considered as the de facto standard for information processing and exchange on the Internet and in the enterprise services domain. It is wid...
Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw...
MSWIM
2005
ACM
15 years 9 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari