Sciweavers

2648 search results - page 344 / 530
» Human Factors In Computer Security
Sort
View
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
16 years 3 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
114
Voted
SIGCSE
2009
ACM
114views Education» more  SIGCSE 2009»
16 years 3 months ago
Engaging students through mobile game development
This paper describes using mobile game development as a motivational tool to engage students early in the curriculum. Mobile devices have become an integral part of everyday lives...
Stan Kurkovsky
102
Voted
SIGCSE
2009
ACM
132views Education» more  SIGCSE 2009»
16 years 3 months ago
Retina: helping students and instructors based on observed programming activities
It is difficult for instructors of CS1 and CS2 courses to get accurate answers to such critical questions as "how long are students spending on programming assignments?"...
Christian Murphy, Gail E. Kaiser, Kristin Loveland...
119
Voted
SIGCSE
2009
ACM
130views Education» more  SIGCSE 2009»
16 years 3 months ago
Introducing PyLighter: dynamic code highlighter
Like a screenplay, a program is both a static artifact and instructions for a dynamic performance. This duality can keep laypeople from appreciating the complexity of software sys...
Michael G. Boland, Curtis C. Cliburn
130
Voted
MOBISYS
2007
ACM
16 years 2 months ago
Health-OS: : a position paper
The area of medical monitoring and diagnostics is of particular importance and relevance today. Modern nanotechnology has reduced prices and size of increasingly sophisticated sen...
Darko Kirovski, Nuria Oliver, Mike Sinclair, Desne...