Sciweavers

5722 search results - page 402 / 1145
» Security Function Interactions
Sort
View
JCS
2011
126views more  JCS 2011»
14 years 11 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
IROS
2006
IEEE
115views Robotics» more  IROS 2006»
15 years 10 months ago
Visual Tracking Modalities for a Companion Robot
Abstract— This article presents the development of a humanrobot interaction mechanism based on vision. The functionalities required for such mechanism range from user detection a...
Paulo Menezes, Frédéric Lerasle, Jor...
ACMSE
2006
ACM
15 years 10 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
BROADNETS
2007
IEEE
15 years 10 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
145
Voted
OZCHI
2006
ACM
15 years 10 months ago
Tangible tiles: design and evaluation of a tangible user interface in a collaborative tabletop setup
In this paper we describe a tangible user interface “Tangible Tiles”, which utilizes optically tracked transparent Plexiglass tiles for interaction and display of projected im...
Manuela Waldner, Jörg Hauber, Jürgen Zau...