Sciweavers

524 search results - page 11 / 105
» Why phishing works
Sort
View
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Towards Blocking Outgoing Malicious Impostor Emails
Electronic mails (emails) have become an indispensable part of most people’s daily routines. However, they were not designed for deployment in an adversarial environment, which ...
Erhan J. Kartaltepe, Shouhuai Xu
CHI
2000
ACM
14 years 24 days ago
A diary study of information capture in working life
Despite the increasing number of new devices entering the market allowing the capture or recording of information (whether it be marks on paper, scene, sound or moving images), th...
Barry A. T. Brown, Abigail Sellen, Kenton O'Hara
CORR
2004
Springer
106views Education» more  CORR 2004»
13 years 8 months ago
Why Delannoy numbers?
This article is not a research paper, but a little note on the history of combinatorics: we present here a tentative short biography of Henri Delannoy, and a survey of his most no...
Cyril Banderier, Sylviane R. Schwer
ISMIR
2005
Springer
158views Music» more  ISMIR 2005»
14 years 1 months ago
Exploiting Musical Connections: A Proposal for Support of Work Relationships in a Digital Music Library
Musical works in the Western art music tradition exist in a complex, inter-related web. Works that are derivative or part of another work are common; however, most music informati...
Jenn Riley