Sciweavers

694 search results - page 36 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ISICT
2003
15 years 1 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
IJSN
2006
124views more  IJSN 2006»
14 years 11 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
CCS
2008
ACM
15 years 1 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CCS
2010
ACM
15 years 4 hour ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
15 years 5 months ago
Evaluating On-line Learning Platforms: a Case Study
Our “information-oriented” society shows an increasing exigency of life-long learning. In such framework, online Learning is becoming an important tool to allow the flexibilit...
Francesco Colace, Massimo De Santo, Mario Vento