Sciweavers

12478 search results - page 246 / 2496
» Secure Interaction Design
Sort
View
CHI
2009
ACM
15 years 2 months ago
Interaction programming: next steps
Interaction programming bridges the gap between interaction design and programming, but it has not yet been related directly to mainstream development practice. This paper present...
Harold W. Thimbleby
EWSN
2009
Springer
16 years 5 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
ESAS
2004
Springer
15 years 9 months ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
15 years 8 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
ACSAC
2005
IEEE
15 years 10 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner