Sciweavers

873 search results - page 158 / 175
» step 2005
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
DIGRA
2005
Springer
15 years 5 months ago
Liberal Sims?: Simulated Difference and the Commodity of Social Diversity
This paper outlines how representations of gender, sexuality, race and ethnicity intersect with strategies of late capitalism in The Sims, arguably the most popular video game of ...
A. Brady Curlew
DIGRA
2005
Springer
15 years 5 months ago
The Nip and the Bite
An examination of the contributions that can be made by the field of non-mechanistic cybernetics (as elaborated by Gregory Bateson and Anthony Wilden) to a theory of videogames th...
Darshana Jayemanne
DIGRA
2005
Springer
15 years 5 months ago
Virtually Visual: The effects of visual technologies on online identification
Identification is regarded as an important aspect of beneficial online interaction. In addition to providing the individual with potential psychological benefits, identification w...
Jennifer Martin
DRM
2005
Springer
15 years 5 months ago
Towards a software architecture for DRM
The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of arch...
Sam Michiels, Kristof Verslype, Wouter Joosen, Bar...