Sciweavers

5 search results - page 1 / 1
» A Brief Introduction to Usable Security
Sort
View
INTERNET
2008
144views more  INTERNET 2008»
13 years 4 months ago
A Brief Introduction to Usable Security
Bryan D. Payne, W. Keith Edwards
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 6 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
DRM
2007
Springer
13 years 11 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 4 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed