Sciweavers

12478 search results - page 76 / 2496
» Secure Interaction Design
Sort
View
88
Voted
CHI
2011
ACM
14 years 6 months ago
Privacy for a Networked World: bridging theory and design
Airi Lampinen, Fred Stutzman, Markus Bylund
123
Voted
SOUPS
2006
ACM
15 years 8 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis
95
Voted
AINA
2005
IEEE
15 years 8 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
INFOCOM
2010
IEEE
15 years 1 months ago
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams
—Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges...
Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naiji...