Sciweavers

1597 search results - page 11 / 320
» Mental Models of Computer Security
Sort
View
CHI
2004
ACM
16 years 2 months ago
Social learning through gaming
This position paper describes the implementation and initial findings of a game called Personal Investigator (PI). PI is an online 3D detective game that implements a model of Bri...
Elaine M. Raybourn, Annika Wærn
SOUPS
2009
ACM
15 years 8 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
IJON
2006
117views more  IJON 2006»
15 years 1 months ago
EEG classification using generative independent component analysis
We present an application of Independent Component Analysis (ICA) to the discrimination of mental tasks for EEG-based Brain Computer Interface systems. ICA is most commonly used w...
Silvia Chiappa, David Barber
AISB
2008
Springer
15 years 3 months ago
Cognition without content
According to the traditional conception of the mind, semantical content is perhaps the most important feature distinguishing mental from non-mental systems. And this traditional co...
Paul Schweizer
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 1 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart