Filters








10,240 Hits in 3.0 sec

Typing Asymmetric Client-Server Interaction [chapter]

Franco Barbanera, Sara Capecchi, Ugo de'Liguoro
2010 Lecture Notes in Computer Science  
Motivations Asymmetric session type Higher order sessions Conclusions Client-Server: an asymmetric relation Motivations Asymmetric session type Higher order sessions Conclusions Client-Server: an asymmetric  ...  relation It is an intrinsically asymmetric relationship Motivations Asymmetric session type Higher order sessions Conclusions Client-Server: an asymmetric relation It is an intrinsically asymmetric relationship  ...  (S )S be covariant both in S and in S If p = q problems arise because of an inner incoherence of the principle of delegation for those particular client/server asymmetric interactions: a client receiving  ... 
doi:10.1007/978-3-642-11623-0_5 fatcat:g5fia7pz4ndznp4ioacpxymyqi

Asymmetric game design and player location: An empirical study on mobile play experiences

Yu Feng, Jon A. Preston, Joshua Skelton
2013 Proceedings of CGAMES'2013 USA  
The emergence of new hardware and software tools for game design and play provides an important opportunity to study how players interact and what new modes of play experiences achieve the highest overall  ...  This study examines an asymmetric game design -wherein players choose different roles in a one-against-many scenario.  ...  Fig. 1 1 System Overview -Many Mobile Clients & Single Server Fig. 2 2 PC game server screen the number of defensive and attack interactions among all eight rounds.  ... 
doi:10.1109/cgames.2013.6632618 dblp:conf/cgames/FengPS13 fatcat:p7uebvoshze67hzfehwjw2deze

Electronic Voting by Means of Digital Terrestrial Television The Infrastructure, Security Issues and a Real Test-bed

Roberto Caldelli, Rudy Becarelli, Francesco Filippini, Francesco Picchioni, Riccardo Giorgetti
2010 International Journal of E-Adoption (IJEA)  
The complete infrastructure consists of an MHP (Multimedia Home Platform) application that acts as a client application; a server application that acts as a network/counting server for e-voting; and a  ...  with the help of asymmetric keys encryption.  ...  The adopted model of communication security, instead, makes use of an encrypted channel and two pairs of asymmetrical keys, one for the server and one for the client.  ... 
doi:10.4018/jea.2010010101 fatcat:s5gofyqlhnb2hhphffz6zal6ru

WebTransceiVR

Haohua Lyu, Cyrus Vachha, Qianyi Chen, Odysseus Pyrinis, Avery Liou, Balasaravanan Thoravi Kumaravel, Bjoern Hartmann
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
Figure 1 : Asymmetric remote interaction using WebTransceiVR; two web co-hosts (left and right) are observing the VR user (middle) in the virtual environment through web browsers on laptops and mobiles  ...  The actions performed by the co-host client using these interactive features are relayed to the Unity machine by sending JavaScript GET/POST requests to a custom interaction server running inside the Unity  ...  (Fig. 4 .b) A second type of annotation function is a windowed annotation.  ... 
doi:10.1145/3491101.3519816 fatcat:uu4tywj2obcxdojrtl5cio54fy

A theory of RPC calculi for client–server model

KWANGHOON CHOI, BYEONG-MO CHANG
2019 Journal of functional programming  
Second, the method used to design our stateful server strategy is based on a new locative type system which paves the way for a theory of RPC calculi for the clientserver model.  ...  The feature of the calculus is fully implemented by asymmetric communication in trampolined style suitable for the clientserver model.  ...  All server states during client-server interactions are appropriately encoded in the server for transmission to the client so that server states do not need to be stored in the server.  ... 
doi:10.1017/s0956796819000029 fatcat:qagi2vawufc5tdn3wgq3y2yape

Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)

Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum
2008 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing  
We also introduce an extended asymmetric trust model, describing two new IPC vulnerabilities relating to caller blockage.  ...  Figure 4 : 4 Asymmetric trust and vulnerabilities in synchronous IPC: (a) normal client-server roundtrip, (b) untrustworthy client blocks server, and (c,d) untrusted server blocks client [NEW].  ...  Therefore, we extend the asymmetric trust model to include both untrusted clients and untrusted servers.  ... 
doi:10.1109/prdc.2008.25 dblp:conf/prdc/HerderBGHT08 fatcat:zji2r5oetndxtappkn7lcvekxm

Ensuring information security in corporate communication systems

K.V. Matrokhina, A.B. Makhovikov, E.N. Trofimets, V.S. Litvinenko
2021 E3S Web of Conferences  
If one of the Clients does not answer the call within a certain time, then the other Client (interacting) sends to the Server an "end of communication" packet.  ...  Next, the Initiator-Client sends to the Server a "start" packet containing the Session type ("call"), the Session identifiers of the Initiator Client, Initiator-Client, Destination-Client, and the session  ... 
doi:10.1051/e3sconf/202126609001 fatcat:ozmjivrla5ch5nbek47o4k5qye

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed [chapter]

Roberto Caldelli, Rudy Becarelli, Francesco Filippini, Francesco Picchioni, Riccardo Giorgetti
2009 IFIP Advances in Information and Communication Technology  
The complete infrastructure consists of an MHP (Multimedia Home Platform) application that acts as a client application; a server application that acts as a network/counting server for e-voting; and a  ...  with the help of asymmetric keys encryption.  ...  The adopted model of communication security, instead, makes use of an encrypted channel and two pairs of asymmetrical keys, one for the server and one for the client.  ... 
doi:10.1007/978-3-642-04280-5_2 fatcat:sgjibgd4qbap3edoe54axrkipu

Implementing a VIPSec based application for handhelds: design and optimization issues

Spyros Kopsidas, Dimitris Zisiadis, Leandros Tassiul
2007 Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications  
User sign-in and other subsidiary procedures follow the Client-Server model while the media path is direct between the users.  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.  ...  It also generates the 1024 bits asymmetric keys needed for the client-server communication link (simple Diffie-Hellman protocol).  ... 
doi:10.4108/icst.mobimedia2007.1741 dblp:conf/mobimedia/KopsidasZT07 fatcat:6p46lnfzjbdd3bzbeqa4la3kwm

Design and Implementation of a Corba Fault-Tolerant Object Group Service [chapter]

Graham Morgan, Santosh Shrivastava, Paul Ezhilchelvan, Mark Little
1999 Distributed Applications and Interoperable Systems II  
Both symmetric and asymmetric total order protocols are supported, permitting a member to use say symmetric version in one group and asymmetric version in another group simultaneously.  ...  Client-server group interactions. Online server migration: Assume that it is necessary to migrate a member of a replicated server group to some other machine.  ...  When a client no longer requires a service, the client/server group may be disbanded. Fig. 1 (a) shows a client/server group.  ... 
doi:10.1007/978-0-387-35565-8_29 fatcat:w43zpplgbndujmccq6mkbrxt5e

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests [article]

Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik
2022 arXiv   pre-print
Building upon existing web techniques and features, VICEROY allows accountless consumers to interact with service providers, and later prove that they are the same person in a privacy-preserving manner  ...  Asymmetric tokens: When interacting with a server, a client provides the server with the public part of an asymmetric key-pair called the VCR public key.  ...  Website Interaction When initiating a session with a server, upon a client request, the server generates a unique client id and sends it to the client in the form of a cookie.  ... 
arXiv:2105.06942v2 fatcat:t4uu5vb4j5g3doyqnctarw37oi

An interactive multimedia satellite telemedicine service

L. Pierucci, E. Del Re
2000 IEEE Multimedia  
Then, a socket between the Java server and the client is opened and a client-server application session can start.  ...  Since MEDI is a Web-based application, it has a client-server architecture. A remote machine with server functionality controls concurrent processes from the clients.  ... 
doi:10.1109/93.848435 fatcat:4or4aas66zgyrl4xooahngn53u

Engineering asymmetric steady-state Einstein-Podolsky-Rosen steering in macroscopic hybrid systems [article]

Xinyao Huang, Emil Zeuthen, Qihuang Gong, Qiongyi He
2019 arXiv   pre-print
and type with the light field) to a trusted, highly tunable node, hence offering a path to implementing one-sided device-independent quantum tasks.  ...  As a scenario of particular technological interest in quantum networks, we use our scheme to engineer enhanced steering from an untrusted node with limited tunability (in terms of interaction strength  ...  It seems reasonable to assume that a "cheap" client node has limited interaction strength and type with the optical field (parametrized by C and θ), as compared to the "expensive" server node, and we therefore  ... 
arXiv:1901.04250v1 fatcat:l5kb2ngoprgmldhgbcvs6bqzha

Engineering asymmetric steady-state Einstein-Podolsky-Rosen steering in macroscopic hybrid systems

Xinyao Huang, Emil Zeuthen, Qihuang Gong, Qiongyi He
2019 Physical Review A  
It seems reasonable to assume that a "cheap" client node has limited ranges of interaction strength and type with the optical field (parametrized by C and θ ), as compared to the "expensive" server node  ...  of the "cheap" client system having limited tunability of its interaction type, θ − (this is true for, e.g., unresolved-sideband optomechanical systems and free-space spin ensembles).  ... 
doi:10.1103/physreva.100.012318 fatcat:mdybklmbqnaz5h7q6usurdhmcu

Portable security transaction protocol

Glenn Benson
2007 Computer Networks  
PSTP technology provides high signature strength of mechanism without requiring asymmetric key pairs deployed to client machines.  ...  In general, market acceptance of asymmetric key pairs deployed to servers is good; and acceptance of asymmetric key pairs deployed to clients is poor.  ...  Halevi [52] creates sessions where the server has an asymmetric key pair and the client has a password.  ... 
doi:10.1016/j.comnet.2006.06.004 fatcat:vfaxg6dsvvfdfe6f3xcfev4g64
« Previous Showing results 1 — 15 out of 10,240 results