Sciweavers

12478 search results - page 239 / 2496
» Secure Interaction Design
Sort
View
CHI
2007
ACM
16 years 4 months ago
Taking CHI for a drive: interaction in the car
With the increasing number of cars on the road, longer commutes, and the proliferation of complex information and entertainment features, there is a greater need for careful inter...
David M. Krum, Dietrich Manstetten, Clifford Nass,...
IACR
2011
196views more  IACR 2011»
14 years 4 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
WIMOB
2008
IEEE
15 years 10 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
TRUSTBUS
2007
Springer
15 years 10 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
15 years 10 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya