Sciweavers

2648 search results - page 97 / 530
» Human Factors In Computer Security
Sort
View
103
Voted
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
BCSHCI
2007
14 years 11 months ago
A card-sorting probe of e-banking trust perceptions
This paper investigates the issue of trust mediation in eBanking. The card sorting technique was used to probe factors influencing subjects’ attitudes to alternative e-banking h...
Tim French, Kecheng Liu, Mark Springett
AINA
2004
IEEE
15 years 1 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
TABLETOP
2008
IEEE
15 years 4 months ago
Contextual design considerations for co-located, collaborative tables
To date, digital tabletop research has predominantly focused on resolving fundamental software and hardware challenges introduced by this new interactive platform. Understanding n...
James R. Wallace, Stacey D. Scott
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 3 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee