Sciweavers

2648 search results - page 198 / 530
» Human Factors In Computer Security
Sort
View
AGENTS
1997
Springer
15 years 8 months ago
COLLAGEN: When Agents Collaborate with People
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Charles Rich, Candace L. Sidner
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
CCS
2004
ACM
15 years 10 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ASIACRYPT
2003
Springer
15 years 9 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
15 years 4 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn