Sciweavers

164 search results - page 11 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 2 months ago
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel wh...
Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendo...
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...
NORDICHI
2004
ACM
14 years 1 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman
POPL
2001
ACM
14 years 8 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi