To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
This paper builds on earlier CSCW studies of domestic technologies, looking at the frequent maintenance required by new security technologies that households are adopting to provi...