Sciweavers

12478 search results - page 315 / 2496
» Secure Interaction Design
Sort
View
NTMS
2008
IEEE
15 years 11 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
DISCEX
2003
IEEE
15 years 10 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
ACISP
2000
Springer
15 years 9 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
138
Voted
ACSAC
1997
IEEE
15 years 9 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
113
Voted
DPPI
2003
ACM
15 years 10 months ago
From seduction to fulfillment: the use of anthropomorphic form in design
In this paper, we discuss the use of anthropomorphic form in the design of products. We assert that anthropomorphic form is not merely an embellishment but that it can be used as ...
Carl F. DiSalvo, Francine Gemperle