Sciweavers

1191 search results - page 122 / 239
» Online Games and Security
Sort
View
ICONFERENCE
2012
13 years 8 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
86
Voted
CHI
2008
ACM
16 years 1 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
136
Voted
JOC
2006
116views more  JOC 2006»
15 years 24 days ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
85
Voted
CEC
2007
IEEE
15 years 7 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
107
Voted
ISTA
2007
15 years 2 months ago
Constructing POSE: A Tool for Eliciting Quality Requirements
: Quality requirements elicitation for new computer applications rests traditionally on interviewing stakeholders. That makes getting these requirements right more complicated than...
Vladimir A. Shekhovtsov, Roland Kaschek, Sergiy Zl...