Sciweavers

2429 search results - page 80 / 486
» Using Aspects to Design a Secure System
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
HCI
2007
13 years 10 months ago
Intuitive Use of User Interfaces: Defining a Vague Concept
In this paper we present a general definition of the concept ‘intuitive use of user interfaces' on the basis of our current interdisciplinary work. ‘Intuitive use’ is re...
Anja Naumann, Jörn Hurtienne, Johann Habakuk ...
CCR
2010
97views more  CCR 2010»
13 years 6 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
IEICET
2008
113views more  IEICET 2008»
13 years 9 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 10 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn