Sciweavers

12478 search results - page 347 / 2496
» Secure Interaction Design
Sort
View
118
Voted
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 10 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
15 years 9 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
169
Voted
IJNSEC
2006
77views more  IJNSEC 2006»
15 years 5 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
WWW
2004
ACM
16 years 5 months ago
A semantic approach for designing business protocols
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...
Ashok U. Mallya, Munindar P. Singh
IROS
2006
IEEE
119views Robotics» more  IROS 2006»
15 years 11 months ago
Design of a Social Mobile Robot Using Emotion-Based Decision Mechanisms
– In this paper, we describe a robot that interacts with humans in a crowded conference environment. The robot detects faces, determines the shirt color of onlooking conference a...
Geoffrey A. Hollinger, Yavor Georgiev, Anthony Man...