Sciweavers

2648 search results - page 175 / 530
» Human Factors In Computer Security
Sort
View
ITICSE
2004
ACM
15 years 10 months ago
An assistive technology project for an HCI course
This presentation describes a project for a standard undergraduate human-computer interaction (HCI) course that incorporates issues related to users who are disabled. It is part o...
Blaise W. Liffick
MHCI
2005
Springer
15 years 10 months ago
Mystery in the museum: collaborative learning activities using handheld devices
In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a “Mystery in the M...
Jorge Simarro Cabrera, Henar Muñoz Frutos, ...
CCS
2007
ACM
15 years 11 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ACISP
2001
Springer
15 years 9 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
151
Voted
ESORICS
2007
Springer
15 years 11 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...