Sciweavers

694 search results - page 38 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
HUC
2007
Springer
15 years 6 months ago
Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp
How should Ubicomp technologies be evaluated? While lab studies are good at sensing aspects of human behavior and revealing usability problems, they are poor at capturing context o...
Yvonne Rogers, Kay Connelly, Lenore Tedesco, Willi...
CCS
2009
ACM
15 years 6 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 5 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee

Publication
117views
14 years 8 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
MIDDLEWARE
2004
Springer
15 years 5 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...