Sciweavers

12478 search results - page 270 / 2496
» Secure Interaction Design
Sort
View
ESORICS
2005
Springer
15 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
APGV
2008
ACM
164views Visualization» more  APGV 2008»
15 years 6 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
CSCWD
2008
Springer
15 years 6 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
DAGSTUHL
2006
15 years 6 months ago
Nonlinear Transaction Pricing in the Securities Trading Value Chain
Most of the research on transaction costs in the market microstructure literature focuses on implicit transaction costs. Research on the design of price schedules for explicit tra...
Matthias Burghardt
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 11 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang