Sciweavers

471 search results - page 46 / 95
» Social applications: exploring a more secure framework
Sort
View
SCIENTOMETRICS
2010
131views more  SCIENTOMETRICS 2010»
13 years 2 months ago
Academic team formation as evolving hypergraphs
This paper quantitatively explores the social and socio-semantic patterns of constitution of academic collaboration teams. To this end, we broadly underline two critical features ...
Carla Taramasco, Jean-Philippe Cointet, Camille Ro...
COMPSAC
2008
IEEE
14 years 2 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
CHI
2009
ACM
14 years 8 months ago
The effect of affective iconic realism on anonymous interactants' self-disclosure
In this paper, we describe progress in research designed to explore the effect of the combination of avatars' visual fidelity and users' anticipated future interaction o...
Sin-Hwa Kang, Jonathan Gratch, James H. Watt
BIRTHDAY
2012
Springer
12 years 3 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 8 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel