Sciweavers

1597 search results - page 18 / 320
» Mental Models of Computer Security
Sort
View
IVA
2005
Springer
15 years 5 months ago
Do You See What Eyes See? Implementing Inattentional Blindness
Abstract. This paper presents a computational model of visual attention incorporating a cognitive imperfection known as inattentional blindness. We begin by presenting four factors...
Erdan Gu, Catherine Stocker, Norman I. Badler
NSPW
2004
ACM
15 years 5 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
TC
2008
14 years 11 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
68
Voted
CHI
2003
ACM
16 years 2 days ago
MediaFinder: an interface for dynamic personal media management with semantic regions
Computer users deal with large amounts of personal media often face problems in managing and exploring it. This paper presents Semantic Regions, rectangular regions that enable us...
Hyunmo Kang, Ben Shneiderman
EUROCRYPT
2007
Springer
15 years 3 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas