Sciweavers

436 search results - page 81 / 88
» Arguing for gaining access to information
Sort
View
ACSAC
2008
IEEE
15 years 6 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
ELPUB
2006
ACM
15 years 5 months ago
What are the Prospects for Publishing Online Scholarly Journals in Malaysia? The Cultural Constraint
Most of the studies conducted on future business models for electronic scholarly publishing have concentrated on the major publishing areas of North America and Western Europe, an...
Jamay'ah Zakaria, Fytton Rowland
ASPLOS
2008
ACM
15 years 1 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...
AVI
2006
15 years 1 months ago
Usability of overview-supported zooming on small screens with regard to individual differences in spatial ability
While zoomable user interfaces can improve the usability of applications by easing data access, a drawback is that some users tend to become lost after they have zoomed in. Previo...
Thorsten Büring, Jens Gerken, Harald Reiterer
CONEXT
2009
ACM
15 years 28 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...