Sciweavers

274 search results - page 30 / 55
» Security user studies: methodologies and best practices
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 1 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
CHI
2006
ACM
15 years 10 months ago
Implications for design
Although ethnography has become a common approach in HCI research and design, considerable confusion still attends both ethnographic practice and the criteria by which it should b...
Paul Dourish
PVLDB
2008
138views more  PVLDB 2008»
14 years 9 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
CAISE
2009
Springer
15 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
CHI
2008
ACM
15 years 10 months ago
Longitudinal usability data collection: art versus science?
Collecting usability data over time is increasingly becoming best practice in industry, but lacks "thought leadership" in current literature; few papers address the topi...
Misha W. Vaughan, Catherine Courage, Stephanie Ros...