Sciweavers

1564 search results - page 36 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
OOPSLA
2009
Springer
14 years 4 months ago
The commenting practice of open source
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
Oliver Arafat, Dirk Riehle
ACISP
2007
Springer
14 years 4 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
JSW
2008
101views more  JSW 2008»
13 years 9 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
JIPS
2007
131views more  JIPS 2007»
13 years 9 months ago
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations
: We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equa...
Ju-Sung Kang, Dowon Hong
USS
2010
13 years 7 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...