Results 1 - 10
of
54
A Study of User-Friendly Hash Comparison Schemes
"... Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usab ..."
Abstract
- Add to MetaCart
comparison. To evaluate the schemes, we performed an online user study with more than 400 participants. Our findings indicate that only a small number of schemes allow quick and accurate comparison across a wide range of subjects from varying backgrounds. Keywords-Security; Human factors I.
22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract
- Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system
unknown title
"... IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1 ..."
Abstract
- Add to MetaCart
IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1
Human Trust Establishment
, 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract
- Add to MetaCart
offering secrecy and authenticity, which we use to support secure messaging and file exchange. Essentially, we support an abstraction to safely “sling ” information from one device to another. 1 SafeSlinger also provides an API for importing applications’ public keys into a user’s contact information
TO CODE OR NOT TO CODE
, 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract
- Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:
POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR
"... 2010 to my wife, Joyce, and my family...- Résumé- ..."
CMU-CyLab-08-007
, 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract
- Add to MetaCart
-tations of these protocols become more prone to human error. We present GAnGS, a fully-implemented system for exchanging authentic information between mobile de-vices when they are physically present in the same lo-cation. GAnGS is scalable, appropriate for two or more devices. We implement two user-friendly variants of GAn
First Supervisor: Dr. Huib Aldewereld Second Supervisor: Dr. Neelke Doorn
, 2014
"... As this master thesis marks the end of my studies at Delft University of Technology, I would like to use this opportunity and thank everyone who has influenced my two-year journey. Those last two years have not been easy. In fact, it has been the most challenging, stressful, and at the same time- th ..."
Abstract
- Add to MetaCart
, willing to pursue master’s degree. I would like to thank Mr. Saakashvili for giving me a chance to be one of those students, and for fully sponsoring my studies at TU Delft. I must express special gratitude to my graduation committee for being way more supportive then I could ever imagine. I would like
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Results 1 - 10
of
54