Sciweavers

8655 search results - page 238 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2003
ACM
15 years 4 months ago
Prominence-interpretation theory: explaining how people assess credibility online
Four years of research has led to a theory that describes how people assess the credibility of Web sites. This theory proposes that users notice and interpret various Web site ele...
B. J. Fogg
NDSS
1997
IEEE
15 years 3 months ago
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...
NDSS
1997
IEEE
15 years 3 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
ACL
2009
14 years 8 months ago
The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language
In this paper, we present initial experiments in the recognition of deceptive language. We introduce three data sets of true and lying texts collected for this purpose, and we sho...
Rada Mihalcea, Carlo Strapparava
SISW
2005
IEEE
15 years 4 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...