130
click to vote
SPW
15 years 5 months ago
2004 Springer
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
SPW
15 years 5 months ago
2004 Springer SPW
15 years 5 months ago
2004 Springer
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
SPW
15 years 5 months ago
2004 Springer
Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major secu...
119
Voted
SPW
15 years 5 months ago
2004 Springer
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
|