Sciweavers

164 search results - page 24 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
INFOCOM
2008
IEEE
14 years 2 months ago
Complex Network Measurements: Estimating the Relevance of Observed Properties
Abstract—Complex networks, modeled as large graphs, received much attention during these last years. However, data on such networks is only available through intricate measuremen...
Matthieu Latapy, Clémence Magnien
CHI
2009
ACM
14 years 8 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
CHI
2002
ACM
14 years 8 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
CCS
2003
ACM
14 years 1 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang