Sciweavers

2648 search results - page 223 / 530
» Human Factors In Computer Security
Sort
View
SKG
2006
IEEE
15 years 10 months ago
Top Ten Questions To Design A Successful Grid Portal
With the enhancement of Grid application, Grid portal provides a unique interface for end-users to access distributed resources and are used widely in Knowledge Grid, e-Science, e...
Xiao Dong Wang, Xiaobo Yang, Rob Allan
AINA
2005
IEEE
15 years 10 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
EUROPAR
2010
Springer
15 years 5 months ago
Parallel Enumeration of Shortest Lattice Vectors
Abstract. Lattice basis reduction is the problem of finding short vectors in lattices. The security of lattice based cryptosystems is based on the hardness of lattice reduction. Fu...
Özgür Dagdelen, Michael Schneider 0002
SIGCSE
2009
ACM
169views Education» more  SIGCSE 2009»
16 years 4 months ago
The impact of instructor initiative on student learning: a tutoring study
In the quest to find instructional approaches that benefit student learning, engagement, and retention, evidence suggests providing students with hands-on practice is a worthwhile...
Kristy Elizabeth Boyer, Robert Phillips, Michael D...
CSE
2009
IEEE
15 years 11 months ago
Modeling User Perception of Interaction Opportunities for Effective Teamwork
—This paper presents a model of collaborative decision-making for groups that involve people and computer agents. The model distinguishes between actions relating to participants...
Ece Kamar, Ya'akov Gal, Barbara J. Grosz