Sciweavers

1573 search results - page 101 / 315
» Strong User Authentication
Sort
View
LWA
2008
14 years 11 months ago
An Exploratory Study of User Goals and Strategies in Podcast Search
We report on an exploratory, qualitative user study designed to identify users' goals underlying podcast search, the strategies used to gain access to podcasts, and how curre...
Jana Besser, Katja Hofmann, Martha Larson
UMUAI
2010
105views more  UMUAI 2010»
14 years 8 months ago
Towards personality-based user adaptation: psychologically informed stylistic language generation
Conversation is an essential component of social behavior, one of the primary means by which humans express intentions, beliefs, emotions, attitudes and personality. Thus the deve...
François Mairesse, Marilyn A. Walker
SACMAT
2004
ACM
15 years 3 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
WPES
2004
ACM
15 years 3 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACSAC
2003
IEEE
15 years 3 months ago
S-ARP: a Secure Address Resolution Protocol
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution P...
Danilo Bruschi, A. Ornaghi, Emilia Rosti