Sciweavers

694 search results - page 49 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
DSS
2006
170views more  DSS 2006»
14 years 12 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
CHI
2008
ACM
16 years 6 days ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
NETWORKING
2004
15 years 1 months ago
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...
Haidong Xia, José Carlos Brustoloni
ESSOS
2010
Springer
15 years 8 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
DIMVA
2010
15 years 1 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna