Sciweavers

12478 search results - page 286 / 2496
» Secure Interaction Design
Sort
View
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
JTAER
2006
78views more  JTAER 2006»
15 years 4 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 11 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
ETS
2002
IEEE
121views Hardware» more  ETS 2002»
15 years 4 months ago
Establishing Connections: Interactivity Factors for a Distance Education Course
Both academic institutions and businesses are exploring a shift from face-to-face instruction to distance learning. However, without the foundation of a systematic instructional d...
Diane Berger Ehrlich
DSVIS
2008
Springer
15 years 6 months ago
Comparing Mixed Interactive Systems for Navigating 3D Environments in Museums
This work aims at developing appropriate Mixed Interaction Systems (MIS) for navigating 3D environments in a science centre context. Due to the wide range and multi-disciplinary de...
Emmanuel Dubois, Cédric Bach, Philippe Trui...