Sciweavers

18918 search results - page 3757 / 3784
» Using Technology in Teaching
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
14 years 10 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
IJHCI
2007
145views more  IJHCI 2007»
14 years 10 months ago
20 Years of Four HCI Conferences: A Visual Exploration
We present a visual exploration of the field of human-computer interaction through the author and article metadata of four of its major conferences: the ACM conferences on Comput...
Nathalie Henry, Howard Goodell, Niklas Elmqvist, J...
IJISEC
2007
119views more  IJISEC 2007»
14 years 10 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
14 years 10 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
TC
2008
14 years 10 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
« Prev « First page 3757 / 3784 Last » Next »