Sciweavers

162 search results - page 21 / 33
» The Design of a Trustworthy Voting System
Sort
View
CHI
2010
ACM
15 years 6 months ago
Building interpretable discussions: for effective public engagement
Shifts in the culture of civic engagement, technologies and practices surrounding social media, and pressure from political leaders have ignited a movement amongst gov’t agencie...
Travis Kriplean
CHI
2005
ACM
16 years 4 days ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
SPW
2000
Springer
15 years 3 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
ERSA
2006
102views Hardware» more  ERSA 2006»
15 years 1 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
CODES
2008
IEEE
15 years 6 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...