Sciweavers

557 search results - page 64 / 112
» Two experiences designing for effective security
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 5 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
MOBIHOC
2008
ACM
16 years 1 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
MOBICOM
2000
ACM
15 years 6 months ago
An end-to-end approach to host mobility
We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Exi...
Alex C. Snoeren, Hari Balakrishnan
BCSHCI
2008
15 years 3 months ago
Assessing the benefits of multimodal feedback on dual-task performance under demanding conditions
The last few years have seen the release of an increasing number of new IT-related devices into the marketplace that have started to utilize tactile feedback. These include those ...
Ju-Hwan Lee, Charles Spence
SOSP
2005
ACM
15 years 11 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...