Sciweavers

2648 search results - page 139 / 530
» Human Factors In Computer Security
Sort
View
SICHERHEIT
2010
15 years 2 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...
SPAA
2003
ACM
15 years 10 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
ASIACRYPT
2011
Springer
14 years 5 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
SIGOPSE
1998
ACM
15 years 9 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
125
Voted
ACMDIS
2006
ACM
15 years 11 months ago
Designing interfaces to enrich personalization
Peripheral awareness systems offer significant promise to help people to manage the abundance of information available to them without placing significant additional demands on ...
James R. Eagan