Sciweavers

274 search results - page 23 / 55
» Security user studies: methodologies and best practices
Sort
View
CCS
2010
ACM
14 years 10 months ago
The security of modern password expiration: an algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
HCI
2007
14 years 11 months ago
A Cross Culture Study on Phone Carrying and Physical Personalization
The mobile phone has become one of the essential objects that people carry when they leave home. By conducting a series of street interviews in 11 cities on 4 continents, we attemp...
Yanqing Cui, Jan Chipchase, Fumiko Ichikawa
EUROPKI
2006
Springer
15 years 1 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
SOUPS
2009
ACM
15 years 4 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
ITC
2000
IEEE
74views Hardware» more  ITC 2000»
15 years 2 months ago
A good excuse for reuse: "open" TAP controller design
In this paper we present a design for IEEE 1149.1 Test Access Port (TAP)controllers that is based on a practical reuse methodology. While the basic use and core functionality of T...
David B. Lavo