Sciweavers

558 search results - page 28 / 112
» Safe and Effective Determinant Evaluation
Sort
View
HCI
2009
14 years 9 months ago
Navigation Support for the Walking Wounded
We aim at designing an effective evacuation support system for disaster response, specifically tailored to aid the walking wounded, a significant group of victims suffering from re...
Lucy T. Gunawan, Augustinus H. J. Oomes, Zhenke Ya...
PEPM
2010
ACM
15 years 8 months ago
Making "stricterness" more relevant
Adapting a strictness analyser to have it take into account explicit strictness annotations can be a tricky business. Straightforward extensions of analyses based on relevance typ...
Stefan Holdermans, Jurriaan Hage
ACSAC
2005
IEEE
15 years 5 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 3 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
ECRIME
2007
15 years 3 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...