176
click to vote
AISM
15 years 1 months ago
2004
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
145
Voted
UIALL
15 years 5 months ago
2004 Springer
Abstract. The paper claims that processes for monitoring, assessing and ensuring appropriate levels of accessibility and usability have to be adopted by web development and mainten...
136
click to vote
SSWMC
15 years 1 months ago
2004
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
134
Voted
TRUSTBUS
15 years 5 months ago
2004 Springer
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
130
click to vote
SPW
15 years 5 months ago
2004 Springer
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
|