Sciweavers

495 search results - page 63 / 99
» Signed quorum systems
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 6 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
CCS
2001
ACM
15 years 4 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
ASSETS
2010
ACM
14 years 10 months ago
Iwalk: a lightweight navigation system for low-vision users
Smart phones typically support a range of GPS-enabled navigation services. However, most navigation services on smart phones are of limited use to people with visual disabilities....
Amanda J. Stent, Shiri Azenkot, Ben Stern
PERVASIVE
2004
Springer
15 years 5 months ago
Recognizing Workshop Activity Using Body Worn Microphones and Accelerometers
Most gesture recognition systems analyze gestures intended for communication (e.g. sign language) or for command (e.g. navigation in a virtual world). We attempt instead to recogn...
Paul Lukowicz, Jamie A. Ward, Holger Junker, Mathi...
HUMAN
2003
Springer
15 years 5 months ago
Peer-to-Peer Money: Free Currency over the Internet
This paper proposes a resilient, alternative monetary system on the Internet called i-WAT, based on WAT System[1] which uses a form of promissory note as the medium of exchanging g...
Kenji Saito