Sciweavers

791 search results - page 47 / 159
» Users and Trust in Cyberspace
Sort
View
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 7 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
SUTC
2010
IEEE
13 years 6 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
ACSAC
2006
IEEE
14 years 1 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
JTAER
2006
78views more  JTAER 2006»
13 years 7 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
CHI
2009
ACM
14 years 8 months ago
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust
This paper examines a visual design element unique to situated, hot-spot style, services: locativeness. This is the extent to which the media representing a service relates to its...
Vassilis Kostakos, Ian Oakley