Sciweavers

791 search results - page 94 / 159
» Users and Trust in Cyberspace
Sort
View
AGILEDC
2004
IEEE
13 years 11 months ago
The XP Customer Role in Practice: Three Studies
The Customer is the only non-developer role in eXtreme Programming (XP). The Customer's explicit responsibilities are to drive the project, providing project requirements (us...
Angela Martin, Robert Biddle, James Noble
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
13 years 11 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
AAAI
2008
13 years 10 months ago
A Demonstration of the RADAR Personal Assistant
Email clients were not designed to serve as a task management tools, but a high volume of task-relevant information in email leads many people to use email clients for this purpos...
Andrew Faulring, Brad A. Myers, Ken Mohnkern, Mich...
AAAI
2007
13 years 10 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
CSREASAM
2003
13 years 9 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...