Sciweavers

274 search results - page 19 / 55
» Security user studies: methodologies and best practices
Sort
View
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
SOUPS
2009
ACM
15 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
NDSS
2003
IEEE
15 years 3 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
FC
2010
Springer
141views Cryptology» more  FC 2010»
15 years 1 months ago
When Information Improves Information Security
We investigate a mixed economy of an individual rational expert and several na¨ıve near-sighted agents in the context of security decision making. Agents select between three ca...
Jens Grossklags, Benjamin Johnson, Nicolas Christi...
EUROSPI
2005
Springer
15 years 3 months ago
Using Rational Unified Process in an SME - A Case Study
The Rational Unified Process (RUP) is a comprehensive software development process framework emphasizing use-cases, architecture focus and an iterative approach. RUP is widely know...
Geir Kjetil Hanssen, Hans Westerheim, Finn Olav Bj...