Sciweavers

519 search results - page 10 / 104
» How to make secure email easier to use
Sort
View
AI
2010
Springer
15 years 2 months ago
A Three-Way Decision Approach to Email Spam Filtering
Many classification techniques used for identifying spam emails, treat spam filtering as a binary classification problem. That is, the incoming email is either spam or non-spam....
Bing Zhou, Yiyu Yao, Jigang Luo
ASIACRYPT
2009
Springer
15 years 1 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
W4A
2006
ACM
15 years 3 months ago
How people use presentation to search for a link: expanding the understanding of accessibility on the web
It is well known that many Web pages are difficult for visually disabled people to use. Without access to a rich, visual display, the intended structure and organisation of the pa...
Caroline Jay, Robert Stevens, Mashhuda Glencross, ...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 4 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
NSDI
2008
14 years 12 months ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan