Sciweavers

367 search results - page 26 / 74
» Security Design in Online Games
Sort
View
CSREASAM
2010
14 years 12 months ago
Geotagging Where Cyberspace Comes to Your Place
- The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionalit...
Craig Valli, Peter Hannay
141
Voted
WETICE
2003
IEEE
15 years 7 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
95
Voted
IACR
2011
120views more  IACR 2011»
14 years 1 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
107
Voted
OOPSLA
2009
Springer
15 years 8 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
144
Voted
ACMDIS
2010
ACM
15 years 2 months ago
On the design of a "moody" keyboard
To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard key...
Alexander De Luca, Bernhard Frauendienst, Max-Eman...