Sciweavers

1597 search results - page 17 / 320
» Mental Models of Computer Security
Sort
View
ACHI
2008
IEEE
15 years 6 months ago
User-Centred Development of Mobile Interfaces to a Pervasive Computing Environment
—A challenging issue for HCI is the development of usable mobile interfaces for interactions with a complex pervasive environment. We consider a need for interfaces which automat...
Karin Leichtenstern, Elisabeth André
EUROCRYPT
2004
Springer
15 years 5 months ago
Multi-party Computation with Hybrid Security
It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if – t < n/2 of t...
Matthias Fitzi, Thomas Holenstein, Jürg Wulls...
ATAL
2011
Springer
13 years 11 months ago
A computational model of achievement motivation for artificial agents
Computational models of motivation are tools that artificial agents can use to autonomously identify, prioritize, and select the goals they will pursue. Previous research has focu...
Kathryn Elizabeth Merrick
93
Voted
CCS
2010
ACM
14 years 12 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
SIGOPSE
2004
ACM
15 years 5 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn