Sciweavers

12478 search results - page 247 / 2496
» Secure Interaction Design
Sort
View
IFIP
2009
Springer
15 years 2 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
EVOTING
2004
91views Hardware» more  EVOTING 2004»
15 years 5 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter
INTERACT
2003
15 years 5 months ago
HCI in Spain
: Human-Computer Interaction field in Spain has experienced a great expansion in the last few years, even if this happened with some delay in comparison with neighbour countries. T...
Julio Abascal, Jesús Lorés
DPPI
2003
ACM
15 years 9 months ago
Dancing with a machine: a case of experience-driven design
For experience-driven design to become an influential design strategy, much effort should be put into method development and elaborate case studies. In the present paper, we prese...
Paul Hekkert, Marc Mostert, Guido Stompff
136
Voted
CODES
2007
IEEE
15 years 10 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont