Sciweavers

694 search results - page 22 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CCS
2006
ACM
15 years 1 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
84
Voted
WSC
2001
14 years 11 months ago
The design of a web-based training system for simulation analysis
Simulation beginners often spend a great amount of time to accumulate the knowledge as well as the experience to overcome the technical complexity of computer simulation. Limited ...
Yu-Hui Tao, Shin-Ming Guo
ICSE
2003
IEEE-ACM
15 years 9 months ago
Sound Methods and Effective Tools for Engineering Modeling and Analysis
Modeling and analysis is indispensable in engineering. To be safe and effective, a modeling method requires a language with a validated semantics; feature-rich, easy-to-use, depen...
David Coppit, Kevin J. Sullivan
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
15 years 25 days ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
LREC
2010
127views Education» more  LREC 2010»
14 years 11 months ago
Evaluation of the PIT Corpus Or What a Difference a Face Makes?
This paper presents the evaluation of the PIT Corpus of multi-party dialogues recorded in a Wizard-of-Oz environment. An evaluation has been performed with two different foci: Fir...
Petra-Maria Strauß, Stefan Scherer, Georg La...