Sciweavers

507 search results - page 24 / 102
» The XTR Public Key System
Sort
View
SRDS
1993
IEEE
15 years 1 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
ISI
2007
Springer
15 years 3 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
93
Voted
ISPA
2007
Springer
15 years 3 months ago
Grid and Distributed Public Computing Schemes for Structural Proteomics: A Short Overview
Grid and distributed public computing schemes has become an essential tool for many scientific fields including bioinformatics, computational biology and systems biology. The adopt...
Azhar Ali Shah, Daniel Barthel, Natalio Krasnogor
PERVASIVE
2006
Springer
14 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
75
Voted
ASSETS
2010
ACM
14 years 10 months ago
Improving public transit usability for blind and deaf-blind people by connecting a braille display to a smartphone
We conducted interviews with blind and deaf-blind people to understand how they use the public transit system. In this paper, we discuss key challenges our participants faced and ...
Shiri Azenkot, Emily Fortuna