Sciweavers

557 search results - page 22 / 112
» Two experiences designing for effective security
Sort
View
ICIS
2000
13 years 10 months ago
Trust in e-commerce vendors: a two-stage model
This study investigates the development of trust in a Web-based vendor during two stages of a consumer's Web experience: exploration and commitment. Through an experimental d...
D. Harrison McKnight, Vivek Choudhury, Charles J. ...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
14 years 2 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
IROS
2007
IEEE
112views Robotics» more  IROS 2007»
14 years 2 months ago
Design of a spring backbone micro endoscope
— This work introduces a modified endoscope structure that employs a spring as its backbone. This design allows backdrivability of the mechanism due to the flexibility of the spr...
Dong-Geol Choi, Byung-Ju Yi, Whee Kuk Kim
FAST
2003
13 years 10 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
SOUPS
2006
ACM
14 years 2 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...