Sciweavers

1618 search results - page 91 / 324
» Privacy Interfaces for Information Management
Sort
View
CCS
2007
ACM
14 years 3 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
COMSUR
2011
218views Hardware» more  COMSUR 2011»
12 years 8 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
CSCW
2004
ACM
14 years 2 months ago
Field studies of computer system administrators: analysis of system management tools and practices
Computer system administrators are the unsung heroes of the information age, working behind the scenes to configure, maintain, and troubleshoot the computer infrastructure that un...
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben M...
ACSAC
2005
IEEE
14 years 2 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
SIGUCCS
2004
ACM
14 years 2 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson