Sciweavers

2648 search results - page 53 / 530
» Human Factors In Computer Security
Sort
View
WWW
2008
ACM
15 years 10 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CHI
1997
ACM
15 years 2 months ago
Performance Differences in the Fingers, Wrist, and Forearm in Computer Input Control
Recent work in computer input control has sought to maximize the use of the fingers in the operation of computer pointing devices. The main rationale is the hypothesis that the m...
Ravin Balakrishnan, I. Scott MacKenzie
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 7 days ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
CSCWD
2009
Springer
15 years 1 months ago
Privacy preserving on Radio Frequency Identification systems
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing l...
Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
TAP
2010
Springer
191views Hardware» more  TAP 2010»
14 years 8 months ago
Mesh saliency and human eye fixations
raction, simplification, segmentation, illumination, rendering, and illustration. Even though this technique is inspired by models of low-level human vision, it has not yet been v...
Youngmin Kim, Amitabh Varshney, David W. Jacobs, F...