Sciweavers

2648 search results - page 135 / 530
» Human Factors In Computer Security
Sort
View
WPES
2004
ACM
15 years 10 months ago
Assessing global disclosure risk in masked microdata
In this paper, we introduce a general framework for microdata and three disclosure risk measures (minimal, maximal and weighted). We classify the attributes from a given microdata...
Traian Marius Truta, Farshad Fotouhi, Daniel C. Ba...
CHES
2007
Springer
136views Cryptology» more  CHES 2007»
15 years 11 months ago
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient ...
Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
JOC
2007
133views more  JOC 2007»
15 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
CHI
2010
ACM
15 years 12 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
130
Voted
CIS
2005
Springer
15 years 10 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang