User Interface between user and information systems has a great role in system adoption. Based on technology acceptance model, acceptance of a system is explained as a function of...
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...