Sciweavers

679 search results - page 108 / 136
» Using decision problems in public key cryptography
Sort
View
ICSE
1997
IEEE-ACM
15 years 5 months ago
Prioritizing Software Requirements in an Industrial Setting
The planning of additional featuresand releases is a major concem for commercialsoftware companies. We describe how, in collaboration with Ericsson Radio Systems, we developed and...
Kevin Ryan, Joachim Karlsson
DSN
2007
IEEE
15 years 7 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 7 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
SRDS
2003
IEEE
15 years 6 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
NSDI
2007
15 years 3 months ago
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts
Determining the physical location of Internet hosts is a critical enabler for many new location-aware services. In this paper, we present Octant, a novel, comprehensive framework ...
Bernard Wong, Ivan Stoyanov, Emin Gün Sirer