Sciweavers

3395 search results - page 621 / 679
» Computational Differential Privacy
Sort
View
131
Voted
CSCW
2006
ACM
15 years 9 months ago
Moving office: inhabiting a dynamic building
Mixed Reality Architecture (MRA) supports distributed teams in their everyday work activities by linking multiple physical spaces across a shared three-dimensional virtual world. ...
Holger Schnädelbach, Alan Penn, Phil Steadman...
122
Voted
SOUPS
2006
ACM
15 years 9 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
SOUPS
2006
ACM
15 years 9 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ENC
2005
IEEE
15 years 9 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...
WORDS
2005
IEEE
15 years 9 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...