Sciweavers

1191 search results - page 122 / 239
» Online Games and Security
Sort
View
ICONFERENCE
2012
12 years 6 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
CHI
2008
ACM
14 years 10 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
JOC
2006
116views more  JOC 2006»
13 years 10 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
CEC
2007
IEEE
14 years 4 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
ISTA
2007
13 years 11 months ago
Constructing POSE: A Tool for Eliciting Quality Requirements
: Quality requirements elicitation for new computer applications rests traditionally on interviewing stakeholders. That makes getting these requirements right more complicated than...
Vladimir A. Shekhovtsov, Roland Kaschek, Sergiy Zl...