Sciweavers

12478 search results - page 321 / 2496
» Secure Interaction Design
Sort
View
127
Voted
DAC
2000
ACM
16 years 5 months ago
Interactive co-design of high throughput embedded multimedia
The idea of Force-Directed Scheduling (FDS) was first introduced by Paulin and Knight to minimize the number of resources required in the high-level synthesis of high-throughput A...
Thierry J.-F. Omnés, Thierry Franzetti, Fra...
PLDI
2006
ACM
15 years 11 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
CASES
2010
ACM
15 years 2 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
PERCOM
2004
ACM
16 years 4 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
CHI
2008
ACM
16 years 5 months ago
Child computer interaction
In this project an interactive computer system is designed that envisions to contribute to young children's musical education. From literature, requirements for musical inter...
Janet C. Read, Panos Markopoulos, Narcís Pa...