Sciweavers

2927 search results - page 11 / 586
» Secure Distributed Human Computation
Sort
View
CHI
2007
ACM
14 years 8 months ago
Designing software for consumers to easily set up a secure home network
Brenton Elmore, Stuart Hamilton, Subbarao Ivaturi
CHI
2007
ACM
14 years 8 months ago
Security user studies: methodologies and best practices
Serge Egelman, Jennifer King, Robert C. Miller, Ni...
CCS
1993
ACM
13 years 12 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
CHI
2011
ACM
12 years 11 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...