Sciweavers

694 search results - page 55 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ACSAC
2010
IEEE
14 years 10 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
INTERACT
2003
15 years 1 months ago
The Process of Developing a Mobile Device for Communication in a Safety-Critical Domain
: This paper describes the process of developing an interactive mobile system for use in a safety-critical domain. The system was developed to inquire into the extent of which coor...
Jesper Kjeldskov, Jan Stage
INFOCOM
2010
IEEE
14 years 10 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
IJBC
2006
93views more  IJBC 2006»
14 years 11 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
SOUPS
2005
ACM
15 years 5 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...