Sciweavers

519 search results - page 5 / 104
» How to make secure email easier to use
Sort
View
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 9 months ago
It's Not What You Have, But How You Use It: Compromises in Mobile Device Use
As users begin to use many more devices for personal information management (PIM) than just the traditional desktop computer, it is essential for HCI researchers to understand how...
Manas Tungare, Manuel A. Pérez-Quiño...
CEAS
2007
Springer
15 years 3 months ago
A Game-Theoretic Investigation of the Effect of Human Interactive Proofs on Spam E-mail
We show how a game-theoretic model of spam e-mailing, which we had introduced in previous work, can be extended to include the possibility of employing Human Interactive Proofs (h...
Dimitrios K. Vassilakis, Ion Androutsopoulos, Evan...
OOPSLA
1995
Springer
15 years 1 months ago
How and Why to Encapsulate Class Trees
eusable framework, pattern or module interface usually is represented by abstract They form an abstract design and leave the implementation to concrete subclasses. ract design is ...
Dirk Riehle
SOUPS
2005
ACM
15 years 3 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
ICSEA
2007
IEEE
15 years 3 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su