Sciweavers

274 search results - page 22 / 55
» Security user studies: methodologies and best practices
Sort
View
WSC
1998
14 years 11 months ago
Interactive Implementation of Optimal Simulation Experiment Designs
An attractive feature of many simulation packages is their availability on desktop computers and their potential for allowing the user to run a simulation model under different co...
Russell C. H. Cheng, John D. Lamb
CSREAPSC
2006
14 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
ACISP
2007
Springer
15 years 4 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
WMASH
2003
ACM
15 years 3 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
GLOBECOM
2008
IEEE
14 years 10 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair