Sciweavers

3021 search results - page 478 / 605
» Trust in recommender systems
Sort
View
SOUPS
2010
ACM
14 years 1 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
FROCOS
2007
Springer
14 years 1 months ago
Certification of Automated Termination Proofs
Abstract. Nowadays, formal methods rely on tools of different kinds: proof assistants with which the user interacts to discover a proof step by step; and fully automated tools whic...
Evelyne Contejean, Pierre Courtieu, Julien Forest,...
ATAL
2006
Springer
14 years 1 months ago
Cognitive agents based simulation for decisions regarding human team composition
This paper proposes to use cognitive multi-agent based simulation to facilitate human team formation decision processes. The models of organizational actors are acquired by a data...
Bruno Gonçalves, António Lopes, Sofi...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
14 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena