Sciweavers

12478 search results - page 341 / 2496
» Secure Interaction Design
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...
123
Voted
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
144
Voted
CASES
2005
ACM
15 years 7 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
117
Voted
KES
2000
Springer
15 years 8 months ago
Speech-based conversation environment for dynamic knowledge interaction
We propose a speech-based conversation environment called Voice Cafe for facilitating dynamic knowledge interaction. Dynamic knowledge interaction is a key concept for creative in...
T. Fukuhara, T. Nishida
INTERACT
2003
15 years 6 months ago
Interaction as Enquiry - Learning with Layered Dynamic Media
: The interactivity afforded to the learner by the computer based media is often fairly restricted. This may be by design choice but is often brought about by resource constraints....
Peter Whalley