Sciweavers

7839 search results - page 228 / 1568
» What's there and what's not
Sort
View
CHI
2009
ACM
16 years 2 months ago
HCI for the real world
HCI as a field comfortably and unquestionably links itself with the corporate world. What does this mean in terms of an ethics of problem choice, meaning the considerations that i...
Nicholas Knouf
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 8 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
SPW
2004
Springer
15 years 7 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
ICECCS
2000
IEEE
196views Hardware» more  ICECCS 2000»
15 years 6 months ago
Complexity: Concept, Causes and Control
Complexity arises from many sources – both within and outwith the system. Internal sources include modern hardware, e.g. super-scalar processors, and external sources include th...
John A. McDermid
CONCUR
1999
Springer
15 years 5 months ago
Validating Firewalls in Mobile Ambients
Abstract. The ambient calculus is a calculus of computation that allows active processes (mobile ambients) to move between sites. A firewall is said to be protective whenever it d...
Flemming Nielson, Hanne Riis Nielson, René ...