Sciweavers

390 search results - page 26 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
CASSIS
2004
Springer
14 years 1 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
14 years 8 months ago
A visual-analytic toolkit for dynamic interaction graphs
In this article we describe a visual-analytic tool for the interrogation of evolving interaction network data such as those found in social, bibliometric, WWW and biological appli...
Xintian Yang, Sitaram Asur, Srinivasan Parthasarat...
HICSS
2003
IEEE
92views Biometrics» more  HICSS 2003»
14 years 28 days ago
Human-Robot Interaction for Intelligent Assisted Viewing During Teleoperation
The Visual Acts theory aims to provide intelligent assistance for camera viewpoint selection during teleoperation. It combines top-down partitioning of a task and bottom-up monito...
Gerard T. McKee, Bernard G. Brooks, Paul S. Schenk...
ASIACRYPT
2011
Springer
12 years 7 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
CHI
2005
ACM
14 years 8 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...