Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2013
Supporting creative collaboration in globally distributed companies
CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative workPages 995–1007https://doi.org/10.1145/2441776.2441890Creative ways of working with whiteboards and sticky notes are growing in popularity even in global companies. However, digital tools for enabling these ways of working, especially for geographically distributed teams, have still not been adopted in ...
- ArticleApril 2009
Attacks on the DECT Authentication Mechanisms
CT-RSA '09: Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in CryptologyPages 48–65https://doi.org/10.1007/978-3-642-00862-7_4Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not publicly available. In this paper we reveal ...