Sciweavers

12478 search results - page 207 / 2496
» Secure Interaction Design
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
E-voting: Dependability Requirements and Design for Dependability
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
CCS
1993
ACM
15 years 8 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
IJNSEC
2008
118views more  IJNSEC 2008»
15 years 4 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
BIBE
2004
IEEE
115views Bioinformatics» more  BIBE 2004»
15 years 7 months ago
Discovering Novel Interacting Motif Pairs from Large Protein-Protein Interaction Datasets
Current motif discovery methods can only detect individual motifs in groups of protein sequences--they do not discover potentially-interacting motif pairs underlying the interacti...
Soon-Heng Tan, Wing-Kin Sung, See-Kiong Ng
CHI
2005
ACM
16 years 4 months ago
Interactive sonification of geo-referenced data
This paper describes an investigation of using interactive sonification (non-speech sound) to present geo-referenced statistical data to vision-impaired users for problem solving ...
Haixia Zhao