Sciweavers

1286 search results - page 42 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
155
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 19 days ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
127
Voted
CHI
1998
ACM
15 years 6 months ago
New Media, New Practices: Experiences in Open Learning Course Design
We explore some of the complex issues surrounding the design and use of multimedia and Internet-based learning resources in distance education courses. We do so by analysing our e...
Tamara Sumner, Josie Taylor
132
Voted
ATAL
2006
Springer
15 years 6 months ago
On the complexity of practical ATL model checking
We investigate the computational complexity of reasoning about multi-agent systems using the cooperation logic ATL of Alur, Henzinger, and Kupferman. It is known that satisfiabili...
Wiebe van der Hoek, Alessio Lomuscio, Michael Wool...
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård