Sciweavers

1597 search results - page 162 / 320
» Mental Models of Computer Security
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
EUROCRYPT
2000
Springer
15 years 8 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
IWIA
2005
IEEE
15 years 10 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
CHI
2009
ACM
16 years 5 months ago
Adaptive pointing: implicit gain adaptation for absolute pointing devices
Werner A. K?nig HCI-Group, University of Konstanz Box-D73, Universit?t Konstanz 78457 Konstanz, Germany werner.koenig@uni-konstanz.de Jens Gerken HCI-Group, University of Konstanz ...
Harald Reiterer, Jens Gerken, Stefan Dierdorf, Wer...
139
Voted
CHI
2008
ACM
16 years 5 months ago
Understanding and characterizing insights: how do people gain insights using information visualization?
Even though "providing insight" has been considered one of the main purposes of information visualization (InfoVis), we feel that insight is still a not-well-understood ...
Ji Soo Yi, Youn ah Kang, John T. Stasko, Julie A. ...