Sciweavers

331 search results - page 25 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
MOBISYS
2008
ACM
15 years 10 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
65
Voted
ISCAS
1999
IEEE
206views Hardware» more  ISCAS 1999»
15 years 3 months ago
Transimpedance amplifier with differential photodiode current sensing
This paper presents a balanced receiver structure suitable for wireless infrared data communications. The receiver provides a fixed photodiode bias voltage with the use of a regul...
B. Zand, K. Phang, D. A. Johns
SPW
2004
Springer
15 years 4 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
JPDC
2006
111views more  JPDC 2006»
14 years 11 months ago
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Irregular parallel algorithms pose a significant challenge for achieving high performance because of the difficulty predicting memory access patterns or execution paths. Within an...
Guojing Cong, David A. Bader
MOBIQUITOUS
2007
IEEE
15 years 5 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...