Sciweavers

557 search results - page 37 / 112
» Two experiences designing for effective security
Sort
View
ECIR
2006
Springer
15 years 5 months ago
Can a Workspace Help to Overcome the Query Formulation Problem in Image Retrieval?
We have proposed a novel image retrieval system that incorporates a workspace where users can organise their search results. A task-oriented and usercentred experiment has been dev...
Jana Urban, Joemon M. Jose
CCS
2007
ACM
15 years 10 months ago
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs. Asirra is easy for users; user studies indicate it c...
Jeremy Elson, John R. Douceur, Jon Howell, Jared S...
JDCTA
2010
175views more  JDCTA 2010»
14 years 11 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
ICNSC
2007
IEEE
15 years 10 months ago
Unstable Object Stabilization and Control Using a DD Robot Manipulator
— This paper addresses the issue of robotic manipulation of multi-DOF inverted pendulums. A control scheme is designed using Lyaponov stability theory for both the robot position...
Zhao-Hui Jiang, Kouya Kamise
CSFW
2011
IEEE
14 years 3 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...