Sciweavers

5722 search results - page 354 / 1145
» Security Function Interactions
Sort
View
159
Voted
ATAL
2004
Springer
15 years 9 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
119
Voted
CCS
2004
ACM
15 years 9 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
132
Voted
ASIACRYPT
2007
Springer
15 years 7 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...
INTERACT
2003
15 years 5 months ago
How Do People Get Back to Information on the Web? How Can They Do It Better?
: In one study, people are observed to keep web information for later use through many different methods including the use of Bookmarks (or Favorites), self-addressed email, hand-w...
William P. Jones, Harry Bruce, Susan T. Dumais
129
Voted
INTERACT
2003
15 years 5 months ago
Project InfoSpace: From Information Managing to Information Representation
: The Desktop metaphor has repeatedly been declared antiquated in various ways. It nevertheless continues existing. Despite the widely pronounced critique, it is still not clear wh...
Pamela Ravasio, Ljiljana Vukelja, Gabrio Rivera, M...