Sciweavers

274 search results - page 14 / 55
» Security user studies: methodologies and best practices
Sort
View
AGILEDC
2008
IEEE
13 years 9 months ago
The Accidental Agilists: One Team's Journey from Waterfall to Agile
This case study outlines one team's shift from the traditional waterfall methodology to an agile approach for web and custom application development. The transformation occur...
Mary Beth Snapp, Diane Dagefoerde
SOUPS
2009
ACM
14 years 1 months ago
Sanitization's slippery slope: the design and study of a text revision assistant
For privacy reasons, sensitive content may be revised before it is released. The revision often consists of redaction, that is, the “blacking out” of sensitive words and phras...
Richard Chow, Ian Oberst, Jessica Staddon
CORR
2004
Springer
104views Education» more  CORR 2004»
13 years 7 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 29 days ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
CHI
2005
ACM
14 years 7 months ago
Comparing usability problems and redesign proposals as input to practical systems development
Usability problems predicted by evaluation techniques are useful input to systems development; it is uncertain whether redesign proposals aimed at alleviating those problems are l...
Erik Frøkjær, Kasper Hornbæk