Sciweavers

519 search results - page 41 / 104
» How to make secure email easier to use
Sort
View
SOUPS
2006
ACM
15 years 3 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
92
Voted
SOUPS
2010
ACM
15 years 1 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 9 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
80
Voted
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 3 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
ECOOP
2007
Springer
15 years 3 months ago
MAO: Ownership and Effects for More Effective Reasoning About Aspects
Abstract. Aspect-oriented advice increases the number of places one must consider during reasoning, since advice may affect all method calls and field accesses. MAO, a new variant...
Curtis Clifton, Gary T. Leavens, James Noble