Sciweavers

12478 search results - page 305 / 2496
» Secure Interaction Design
Sort
View
TPDS
2008
106views more  TPDS 2008»
15 years 4 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
CHI
2003
ACM
16 years 5 months ago
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration
A tension exists between designers' comfort with physical artifacts and the need for effective remote collaboration: physical objects live in one place. Previous research and...
Katherine Everitt, Scott R. Klemmer, Robert Lee, J...
JFR
2007
103views more  JFR 2007»
15 years 4 months ago
Evolving interface design for robot search tasks
This paper describes two steps in the evolution of human-robot interaction designs developed by the University of Massachusetts Lowell (UML) and the Idaho National Laboratory (INL...
Holly A. Yanco, Brenden Keyes, Jill L. Drury, Curt...
COLCOM
2005
IEEE
15 years 10 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta