Sciweavers

3482 search results - page 64 / 697
» Designing for security
Sort
View
74
Voted
SOUPS
2009
ACM
15 years 9 months ago
Not one click for security?
: © Not One Click for Security Alan H. Karp, Marc Stiegler, Tyler Close HP Laboratories HPL-2009-53 Secure cooperation, usable security Conventional wisdom holds that security mus...
Alan H. Karp, Marc Stiegler, Tyler Close
148
Voted
WIMOB
2008
IEEE
15 years 9 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
VTC
2010
IEEE
167views Communications» more  VTC 2010»
15 years 28 days ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
132
Voted
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 9 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
94
Voted
EVOTING
2004
91views Hardware» more  EVOTING 2004»
15 years 4 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter