155
click to vote
AISM
14 years 11 months ago
2004
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
122
click to vote
UIALL
15 years 3 months ago
2004 Springer
Abstract. The paper claims that processes for monitoring, assessing and ensuring appropriate levels of accessibility and usability have to be adopted by web development and mainten...
115
click to vote
SSWMC
14 years 11 months ago
2004
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
111
click to vote
TRUSTBUS
15 years 3 months ago
2004 Springer
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
111
click to vote
SPW
15 years 3 months ago
2004 Springer
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
|