Sciweavers

2927 search results - page 12 / 586
» Secure Distributed Human Computation
Sort
View
65
Voted
IPPS
2002
IEEE
15 years 2 months ago
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
Ali Raza Butt, Sumalatha Adabala, Nirav H. Kapadia...
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 3 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
EUPROJECTS
2006
Springer
15 years 1 months ago
Human Computer Confluence
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...
Alois Ferscha, Stefan Resmerita, Clemens Holzmann
HUC
2010
Springer
14 years 10 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...