Sciweavers

2648 search results - page 133 / 530
» Human Factors In Computer Security
Sort
View
HRI
2009
ACM
15 years 11 months ago
The power of suggestion: teaching sequences through assistive robot motions
We present a preliminary implementation of a robot within the context of social skills intervention. The robot engages a human user in an interactive and adaptive game-playing ses...
Ross Mead, Maja J. Mataric
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 10 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
OSDI
2008
ACM
16 years 5 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
171
Voted
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 11 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
16 years 1 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...