Sciweavers

2281 search results - page 284 / 457
» Security Patterns and Secure Systems Design
Sort
View
102
Voted
AIED
2007
Springer
15 years 10 months ago
Pedagogical Agents Trying on a Caring Mentor Role
: We describe the design and evaluation of an affective pedagogical agent persona for Intelligent Tutoring Systems. The goal of our research was to develop an agent embodying a per...
Konstantin Zakharov, Antonija Mitrovic, Lucy Johns...
USENIX
2003
15 years 5 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
135
Voted
GLOBAL
2003
Springer
15 years 9 months ago
UML for Global Computing
Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...
ICCAD
2008
IEEE
103views Hardware» more  ICCAD 2008»
16 years 22 days ago
Hardware protection and authentication through netlist level obfuscation
—Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System–on–Chip (SoC) designs. However, IP vendors are facing major challenges to protect...
Rajat Subhra Chakraborty, Swarup Bhunia
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste