Sciweavers

2648 search results - page 41 / 530
» Human Factors In Computer Security
Sort
View
ITICSE
2009
ACM
15 years 4 months ago
Evaluating student experiences in developing software for humanity
Student involvement in Humanitarian Free and Open Source Software (HFOSS) projects holds the potential to provide a rich education experience to undergraduates. This paper discuss...
Gregory W. Hislop, Heidi J. C. Ellis, Ralph A. Mor...
SIGITE
2004
ACM
15 years 3 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Robustness for Free in Unconditional Multi-party Computation
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
SOUPS
2006
ACM
15 years 3 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...