Sciweavers

519 search results - page 3 / 104
» How to make secure email easier to use
Sort
View
PPPJ
2004
ACM
15 years 3 months ago
MailConfigurator: automatic configuration of e-mail accounts through Java mobile agents
: E-Mail is the most exploited service in the Internet. We present an application based on Java mobile agents to automatically perform required steps to register an account. The us...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
CHI
2004
ACM
15 years 10 months ago
Email task management styles: the cleaners and the keepers
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Jacek Gwizdka
IPCCC
2006
IEEE
15 years 3 months ago
On capturing and containing E-mail worms
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage th...
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A...
CSFW
2008
IEEE
15 years 4 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
ASIACRYPT
2001
Springer
15 years 2 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman