Sciweavers

164 search results - page 12 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
CCS
2008
ACM
13 years 9 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
AICI
2010
13 years 6 months ago
A Cell-Phone Based Brain-Computer Interface for Communication in Daily Life
Moving a brain-computer interface from a laboratory demonstration to real-life applications poses severe challenges to the BCI community. Recently, with advances in the biomedical ...
Yu-Te Wang, Yijun Wang, Tzyy-Ping Jung
HCSE
2010
13 years 5 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
ECIS
2004
13 years 9 months ago
The implementation and use of conceptual standards - the case of the rds-tmc service
The topic of the paper concerns the implementation and use of standards. The standards which are in focus in the paper include conceptual models and descriptions of the functionali...
Owen Eriksson, Anders Forsman
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 1 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson