Sciweavers

2927 search results - page 198 / 586
» Secure Distributed Human Computation
Sort
View
CCS
2010
ACM
15 years 2 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
111
Voted
SICHERHEIT
2010
15 years 11 days ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...
IPPS
2005
IEEE
15 years 8 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
ISWC
1997
IEEE
15 years 6 months ago
Smart Fabric, or "Wearable Clothing"
Wearable computers can now merge seamlessly into ordinary clothing. Using various conductive textiles, data and power distribution as well as sensing circuitry can be incorporated...
Rehmi Post, Maggie Orth
110
Voted
MIDDLEWARE
2004
Springer
15 years 7 months ago
Exploring adaptability of secure group communication using formal prototyping techniques
Traditionally, adaptability in communication frameworks has been restricted to predefined choices without taking into consideration tradeoffs between them and the application req...
Sebastian Gutierrez-Nolasco, Nalini Venkatasubrama...