(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
We investigate how users interact with the results page of a WWW search engine using eye-tracking. The goal is to gain into how users browse the presented abstracts and how they s...
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
We study peer-to-peer service networks consisting of autonomous agents who seek and provide services. To fulfill its local needs, an agent attempts to discover and select informa...
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...