Sciweavers

2648 search results - page 202 / 530
» Human Factors In Computer Security
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 10 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
MM
2005
ACM
142views Multimedia» more  MM 2005»
15 years 10 months ago
Organum: individual presence through collaborative play
Organum Playtest is an interactive installation in which three players collaboratively navigate through a model of the human voice box, using their voices as a joystick. By asking...
Greg Niemeyer, Dan Perkel, Ryan Shaw, Jane McGonig...
ASSETS
2009
ACM
15 years 9 months ago
Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators
The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present ...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Christia...
135
Voted
HT
2007
ACM
15 years 8 months ago
What is an analogue for the semantic web and why is having one important?
This paper postulates that for the Semantic Web to grow and gain input from fields that will surely benefit it, it needs to develop an analogue that will help people not only unde...
m. c. schraefel
CCS
2006
ACM
15 years 8 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen