Sciweavers

1564 search results - page 14 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
CHI
2007
ACM
15 years 10 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 4 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
ICYCS
2008
IEEE
15 years 4 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
ACSAC
1999
IEEE
15 years 1 months ago
Towards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Jared Karro, Jie Wang
DCC
2010
IEEE
14 years 9 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson