Sciweavers

12478 search results - page 80 / 2496
» Secure Interaction Design
Sort
View
JOC
2011
104views more  JOC 2011»
14 years 6 months ago
Short Undeniable Signatures Based on Group Homomorphisms
This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully s...
Jean Monnerat, Serge Vaudenay
INTERACT
2003
15 years 4 months ago
User Centred Design through the Keyhole: Video Design Case
: This paper develops a design case format capable of engaging design practitioners and design students in reflective dialog about their user centred design practice. The core idea...
Ole Sejer Iversen, Jacob Buur
SOUPS
2009
ACM
15 years 9 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
CSFW
2002
IEEE
15 years 8 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
ISSE
2006
15 years 3 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy