Sciweavers

1564 search results - page 242 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ICDCS
2009
IEEE
15 years 7 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 4 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
66
Voted
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 4 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
15 years 4 months ago
Digital Forensics: Defining a Research Agenda
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
Kara L. Nance, Brian Hay, Matt Bishop
LATA
2009
Springer
15 years 4 months ago
A Cryptosystem Based on the Composition of Reversible Cellular Automata
We present conditions which guarantee that a composition of marker cellular automata has the same neighbourhood as each of the individual components. We show that, under certain te...
Adam Clarridge, Kai Salomaa