Sciweavers

694 search results - page 22 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CCS
2006
ACM
15 years 3 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
WSC
2001
15 years 1 months ago
The design of a web-based training system for simulation analysis
Simulation beginners often spend a great amount of time to accumulate the knowledge as well as the experience to overcome the technical complexity of computer simulation. Limited ...
Yu-Hui Tao, Shin-Ming Guo
ICSE
2003
IEEE-ACM
15 years 11 months ago
Sound Methods and Effective Tools for Engineering Modeling and Analysis
Modeling and analysis is indispensable in engineering. To be safe and effective, a modeling method requires a language with a validated semantics; feature-rich, easy-to-use, depen...
David Coppit, Kevin J. Sullivan
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
15 years 3 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
LREC
2010
127views Education» more  LREC 2010»
15 years 1 months ago
Evaluation of the PIT Corpus Or What a Difference a Face Makes?
This paper presents the evaluation of the PIT Corpus of multi-party dialogues recorded in a Wizard-of-Oz environment. An evaluation has been performed with two different foci: Fir...
Petra-Maria Strauß, Stefan Scherer, Georg La...