Sciweavers

12478 search results - page 62 / 2496
» Secure Interaction Design
Sort
View
99
Voted
SIGSOFT
2009
ACM
16 years 3 months ago
Automated security testing of web widget interactions
Cor-Paul Bezemer, Ali Mesbah, Arie van Deursen
123
Voted
ICDCS
2007
IEEE
15 years 8 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
106
Voted
CSE
2009
IEEE
15 years 9 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
FOCS
1999
IEEE
15 years 6 months ago
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-m...
Amit Sahai
139
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...