Sciweavers

193 search results - page 4 / 39
» Security Usability of Petname Systems
Sort
View
IDTRUST
2010
ACM
13 years 3 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
DGO
2003
118views Education» more  DGO 2003»
13 years 6 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
IEEEARES
2010
IEEE
14 years 5 days ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
ICSE
2007
IEEE-ACM
14 years 5 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price
FC
2007
Springer
119views Cryptology» more  FC 2007»
13 years 11 months ago
Improving Usability by Adding Security to Video Conferencing Systems
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...
April Slayden Mitchell, Alan H. Karp