Sciweavers

519 search results - page 32 / 104
» How to make secure email easier to use
Sort
View
63
Voted
CHI
2009
ACM
15 years 10 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ICEIS
2008
IEEE
15 years 4 months ago
SORCER: Computing and Metacomputing Intergrid
— This paper investigates Grid computing from the point of view three basic computing platforms. The platform consists of virtual compute resources, a programming environment all...
Michael Soblewski
SAC
2003
ACM
15 years 2 months ago
Can a Parser be Generated from Examples?
One of the open problems in the area of domain-specific languages is how to make domain-specific language development easier for domain experts not versed in a programming languag...
Marjan Mernik, Goran Gerlic, Viljem Zumer, Barrett...
MOBICOM
1999
ACM
15 years 2 months ago
Next Century Challenges: Nexus - An Open Global Infrastructure for Spatial-Aware Applications
Due to the lack of a generic platform for location- and spatial-aware systems, many basic services have to be reimplemented in each application that uses spatial-awareness. A coop...
Fritz Hohl, Uwe Kubach, Alexander Leonhardi, Kurt ...