Sciweavers

15379 search results - page 19 / 3076
» Protecting users from
Sort
View
HPCA
1996
IEEE
13 years 11 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
HCI
2007
13 years 9 months ago
WATCH-OVER HMI for Vulnerable Road Users' Protection
WATCH-OVER is a European project, aiming at the enhancement of road safety and the impairment of traffic accidents involving vulnerable road users (VRUs), such as pedestrians, bicy...
Katrin Meinken, Roberto Montanari, Mark Fowkes, An...
CJ
2006
78views more  CJ 2006»
13 years 7 months ago
Protecting Users against Phishing Attacks
Engin Kirda, Christopher Krügel
FPLAY
2008
13 years 9 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
SOUPS
2005
ACM
14 years 1 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller