Sciweavers

2429 search results - page 83 / 486
» Using Aspects to Design a Secure System
Sort
View
SOUPS
2010
ACM
14 years 28 days ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
ISJGP
2010
13 years 6 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CAISE
2006
Springer
14 years 24 days ago
Separation and Modularization of Crosscutting Social Patterns in Detailed Architectural Design
This paper outlines an aspect-oriented approach to support separation and modularization of crosscutting concerns in multi-agent systems. Aspects as abstractions to capture social ...
Carla T. L. L. Silva, Jaelson Brelaz de Castro, Jo...
CHI
2005
ACM
14 years 9 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
ESCIENCE
2006
IEEE
14 years 3 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...