Sciweavers

519 search results - page 11 / 104
» How to make secure email easier to use
Sort
View
ECRIME
2007
15 years 1 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
OOPSLA
1998
Springer
15 years 1 months ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils
ICALT
2003
IEEE
15 years 2 months ago
Completing LOM - How Additional Axioms Increase the Utility of Learning Object Metadata
Learning Objects Metadata describing educational resources in order to allow better reusability and retrieval. Unfortunately, annotating complete courses thoroughly with LOM metad...
Jan Brase, Mark Painter, Wolfgang Nejdl
MOBISEC
2009
Springer
15 years 4 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
14 years 6 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...