Sciweavers

293 search results - page 31 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
PERCOM
2009
ACM
16 years 2 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
103
Voted
CLUSTER
2008
IEEE
15 years 8 months ago
Context-aware address translation for high performance SMP cluster system
—User-level communication allows an application process to access the network interface directly. Bypassing the kernel requires that a user process accesses the network interface...
Moon-Sang Lee, Joonwon Lee, Seungryoul Maeng
108
Voted
ICC
2007
IEEE
15 years 8 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
120
Voted
CSMR
1998
IEEE
15 years 6 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
CSCW
2008
ACM
15 years 3 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...