Sciweavers

12478 search results - page 335 / 2496
» Secure Interaction Design
Sort
View
166
Voted
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 10 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
CHI
2009
ACM
16 years 5 months ago
Designing for all users: including the odd users
The field of HCI has played an important role in broadening the spectrum of users of computational artifacts. However, users with extreme preferences are mostly ignored by the des...
Jina Huh, Mark S. Ackerman
144
Voted
TARK
2007
Springer
15 years 11 months ago
A flexible mechanism for dialogue design
In this paper is we apply insights from mechanism design to the design of agent interaction protocols. We show how this allows us a more flexible approach to the design of agent ...
Guido Boella, Jelle Gerbrandy, Joris Hulstijn
133
Voted
ESORICS
2005
Springer
15 years 10 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
JOC
2006
69views more  JOC 2006»
15 years 5 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung