Sciweavers

694 search results - page 25 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
HCI
2007
14 years 11 months ago
Differences in Task Descriptions in the Think Aloud Test
This paper analyzes and discusses the ways tasks are described and perceived in a remote Think Aloud (TA) usability tests session. The paper includes reports from a study and the p...
Lene Nielsen, Sameer Chavan
ICDCSW
2011
IEEE
13 years 9 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
CCS
2010
ACM
14 years 9 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 1 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
ESORICS
2009
Springer
15 years 10 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...