Sciweavers

557 search results - page 37 / 112
» Two experiences designing for effective security
Sort
View
ECIR
2006
Springer
13 years 10 months ago
Can a Workspace Help to Overcome the Query Formulation Problem in Image Retrieval?
We have proposed a novel image retrieval system that incorporates a workspace where users can organise their search results. A task-oriented and usercentred experiment has been dev...
Jana Urban, Joemon M. Jose
CCS
2007
ACM
14 years 2 months ago
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs. Asirra is easy for users; user studies indicate it c...
Jeremy Elson, John R. Douceur, Jon Howell, Jared S...
JDCTA
2010
175views more  JDCTA 2010»
13 years 3 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
ICNSC
2007
IEEE
14 years 3 months ago
Unstable Object Stabilization and Control Using a DD Robot Manipulator
— This paper addresses the issue of robotic manipulation of multi-DOF inverted pendulums. A control scheme is designed using Lyaponov stability theory for both the robot position...
Zhao-Hui Jiang, Kouya Kamise
CSFW
2011
IEEE
12 years 8 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...