Sciweavers

4609 search results - page 887 / 922
» Automatic Generation of Sigma-Protocols
Sort
View
ICAIL
2005
ACM
15 years 5 months ago
Effective Document Clustering for Large Heterogeneous Law Firm Collections
Computational resources for research in legal environments have historically implied remote access to large databases of legal documents such as case law, statutes, law reviews an...
Jack G. Conrad, Khalid Al-Kofahi, Ying Zhao, Georg...
SIGIR
2005
ACM
15 years 5 months ago
An industrial-strength content-based music recommendation system
We present a metadata free system for the interaction with massive collections of music, the MusicSurfer. MusicSurfer automatically extracts descriptions related to instrumentatio...
Pedro Cano, Markus Koppenberger, Nicolas Wack
SOUPS
2005
ACM
15 years 5 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
SOUPS
2005
ACM
15 years 5 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
CCS
2005
ACM
15 years 5 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin