Sciweavers

842 search results - page 68 / 169
» About the authors
Sort
View
97
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
118
Voted
LADC
2007
Springer
15 years 6 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
CORR
2008
Springer
138views Education» more  CORR 2008»
15 years 19 days ago
Computing Minimum Spanning Trees with Uncertainty
Abstract. We consider the minimum spanning tree problem in a setting where information about the edge weights of the given graph is uncertain. Initially, for each edge e of the gra...
Thomas Erlebach, Michael Hoffmann 0002, Danny Kriz...
118
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
117
Voted
CHI
2007
ACM
16 years 28 days ago
An alternative to push, press, and tap-tap-tap: gesturing on an isometric joystick for mobile phone text entry
A gestural text entry method for mobile is presented. Unlike most mobile phone text entry methods, which rely on repeatedly pressing buttons, our gestural method uses an isometric...
Jacob O. Wobbrock, Duen Horng Chau, Brad A. Myers