Sciweavers

2648 search results - page 329 / 530
» Human Factors In Computer Security
Sort
View
207
Voted
LCN
2008
IEEE
15 years 9 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
99
Voted
SOUPS
2005
ACM
15 years 9 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
126
Voted
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
SAC
2010
ACM
15 years 3 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
DAC
2005
ACM
16 years 4 months ago
DTM: dynamic tone mapping for backlight scaling
- This paper proposes an approach for pixel transformation of the displayed image to increase the potential energy saving of the backlight scaling method. The proposed approach tak...
Ali Iranli, Massoud Pedram