Sciweavers

519 search results - page 6 / 104
» How to make secure email easier to use
Sort
View
KES
2010
Springer
14 years 8 months ago
From Information to Sense-Making: Fetching and Querying Semantic Repositories
Information, its gathering, sharing, and storage, is growing at a very rapid rate. Information turned into knowledge leads to sensemaking. Ontologies, and their representations in ...
Tope Omitola, Ian Millard, Hugh Glaser, Nicholas G...
CEAS
2008
Springer
14 years 11 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
EUROPKI
2009
Springer
14 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
SOUPS
2009
ACM
15 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good