Sciweavers

2648 search results - page 141 / 530
» Human Factors In Computer Security
Sort
View
AINA
2003
IEEE
15 years 8 months ago
Signature Schemes Based on Two Hard Problems Simultaneously
In 1994, Harn proposed a signature scheme based on the modified ElGamal's scheme and claimed that the security relies on both of the factorization and the discrete logarithm....
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
ACNS
2003
Springer
156views Cryptology» more  ACNS 2003»
15 years 8 months ago
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challeng...
Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu
CSCW
2004
ACM
15 years 10 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
170
Voted
SIGCSE
2008
ACM
151views Education» more  SIGCSE 2008»
15 years 4 months ago
Ucigame, a java library for games
Ucigame (pronounced OO-see-GAH-me) is a Java package that supports the programming of 2D sprite-based computer games. Designed for novice programmers, it enables students in an in...
Daniel Frost
CHI
2009
ACM
16 years 5 months ago
Learning to predict information needs: context-aware display as a cognitive aid and an assessment tool
We discuss the problem of assessing and aiding user performance in dynamic tasks that require rapid selection among multiple information sources. Motivated by research in human se...
Bradley C. Love, Matt Jones, Marc T. Tomlinson, Mi...