Sciweavers

162 search results - page 2 / 33
» Securing Email Archives through User Modeling
Sort
View
SOUPS
2005
ACM
13 years 10 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
ACSAC
2007
IEEE
13 years 11 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
13 years 9 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
CEAS
2008
Springer
13 years 6 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
IEEEIAS
2008
IEEE
13 years 11 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli