This study investigates the development of trust in a Web-based vendor during two stages of a consumer's Web experience: exploration and commitment. Through an experimental d...
D. Harrison McKnight, Vivek Choudhury, Charles J. ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
— This work introduces a modified endoscope structure that employs a spring as its backbone. This design allows backdrivability of the mechanism due to the flexibility of the spr...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...