Sciweavers

2648 search results - page 152 / 530
» Human Factors In Computer Security
Sort
View
155
Voted
FSTTCS
2003
Springer
15 years 10 months ago
Comparing Sequences with Segment Rearrangements
Computational genomics involves comparing sequences based on “similarity” for detecting evolutionary and functional relationships. Until very recently, available portions of th...
Funda Ergün, S. Muthukrishnan, Süleyman ...
ICIP
2009
IEEE
16 years 6 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
170
Voted
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
SOUPS
2005
ACM
15 years 10 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
ASSETS
2007
ACM
15 years 9 months ago
Adoption and configuration of assistive technologies: a semiotic engineering perspective
This paper discusses semiotic engineering (a design methodology) and its potential for addressing issues concerning the adoption and configuration of assistive technologies. Categ...
Katherine Deibel