Sciweavers

12478 search results - page 283 / 2496
» Secure Interaction Design
Sort
View
CHI
2008
ACM
16 years 5 months ago
Human-Currency Interaction: learning from virtual currency use in China
What happens when the domains of HCI design and money intersect? This paper presents analyses from an ethnographic study of virtual currency use in China to discuss implications f...
Scott D. Mainwaring, Yang Wang 0005
CIC
2006
124views Communications» more  CIC 2006»
15 years 6 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
COMSWARE
2008
IEEE
15 years 11 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
NTMS
2008
IEEE
15 years 11 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
145
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca