Sciweavers

1630 search results - page 262 / 326
» Secure Overlay Network Design
Sort
View
NDSS
1998
IEEE
15 years 2 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 1 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
NSDI
2008
15 years 4 days ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
14 years 9 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
NETGAMES
2006
ACM
15 years 3 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...