Sciweavers

2648 search results - page 12 / 530
» Human Factors In Computer Security
Sort
View
68
Voted
CSCWD
2008
Springer
15 years 3 months ago
Portable devices of security and privacy preservation for e-learning
Jianming Yong, Jiuyong Li, Hua Wang
CCS
2007
ACM
15 years 8 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
FPLAY
2008
15 years 3 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 7 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
BIBE
2004
IEEE
107views Bioinformatics» more  BIBE 2004»
15 years 5 months ago
Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers
The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form...
Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo