Sciweavers

2702 search results - page 300 / 541
» Message from the Editor
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 10 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
ISI
2007
Springer
15 years 10 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
15 years 10 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
RE
2007
Springer
15 years 10 months ago
Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics
In industrial requirements documents natural language is the main presentation means. In such documents, system behavior is specified in the form of scenarios, written as a seque...
Leonid Kof
TSD
2007
Springer
15 years 10 months ago
ECAF: Authoring Language for Embodied Conversational Agents
Abstract. Embodied Conversational Agent (ECA) is the user interface metaphor that allows to naturally communicate information during human-computer interaction in synergic modality...
Ladislav Kunc, Jan Kleindienst