Sciweavers

1597 search results - page 11 / 320
» Mental Models of Computer Security
Sort
View
CHI
2004
ACM
16 years 8 hour ago
Social learning through gaming
This position paper describes the implementation and initial findings of a game called Personal Investigator (PI). PI is an online 3D detective game that implements a model of Bri...
Elaine M. Raybourn, Annika Wærn
104
Voted
SOUPS
2009
ACM
15 years 6 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
IJON
2006
117views more  IJON 2006»
14 years 11 months ago
EEG classification using generative independent component analysis
We present an application of Independent Component Analysis (ICA) to the discrimination of mental tasks for EEG-based Brain Computer Interface systems. ICA is most commonly used w...
Silvia Chiappa, David Barber
AISB
2008
Springer
15 years 1 months ago
Cognition without content
According to the traditional conception of the mind, semantical content is perhaps the most important feature distinguishing mental from non-mental systems. And this traditional co...
Paul Schweizer
SCN
2008
Springer
142views Communications» more  SCN 2008»
14 years 11 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart