Sciweavers

2648 search results - page 159 / 530
» Human Factors In Computer Security
Sort
View
JSW
2008
101views more  JSW 2008»
15 years 4 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
124
Voted
PERVASIVE
2005
Springer
15 years 10 months ago
Physical Browsing Research
Physical browsing is a mobile-device-based interaction method for pervasive computing. In this paper, we describe our research interests and experiences of physical browsing: the ...
Pasi Välkkynen, Timo Tuomisto
168
Voted
ASIACRYPT
2001
Springer
15 years 8 months ago
Short Signatures from the Weil Pairing
Abstract. We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the...
Dan Boneh, Ben Lynn, Hovav Shacham
CHI
2009
ACM
16 years 5 months ago
Correlations among prototypical usability metrics: evidence for the construct of usability
Correlations between prototypical usability metrics from 90 distinct usability tests were strong when measured at the task-level (r between .44 and .60). Using test-level satisfac...
Jeff Sauro, James R. Lewis
WWW
2005
ACM
16 years 5 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin