Garfinkel

Results: 106



#Item
1Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
2

VoTeR Center UConn Voting Technology Research Center PI : A. Shvartsman, Ph.D. Co-PIs: L. Michel Ph.D., A. Russell Ph.D. Senior Staff: M. Desmarais, N. Volgushev Staff: R. Davis, D. Fontaine, S. Garfinkel, E. Kovalev,

Add to Reading List

Source URL: voter.engr.uconn.edu

Language: English
    3

    Multi-stage Replay with Crosscut Jim Chow Geoffrey Lefebvre Dominic Lucchetti Tal Garfinkel

    Add to Reading List

    Source URL: joshm.web.engr.illinois.edu

    Language: English - Date: 2017-02-22 12:44:22
      4

      Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:56:35
        5

        Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

        Add to Reading List

        Source URL: obj.umiacs.umd.edu

        - Date: 2017-05-15 16:43:59
          6

          SANE: A Protection Architecture for Enterprise Networks Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman Dan Boneh, Nick McKeown, Scott Shenker {casado,talg,mfreed,dabo,nickm}@cs.stanford.edu

          Add to Reading List

          Source URL: yuba.stanford.edu

          - Date: 2006-05-12 04:08:41
            7

            Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            - Date: 2005-05-30 16:31:14
              8

              Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller

              Add to Reading List

              Source URL: cups.cs.cmu.edu

              - Date: 2005-06-21 09:58:18
                9

                Secure Web Authentication with Mobile Phones Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab, 32 Vassar Street, Cambridge MA 02139 {minwu, simsong, rcm}@csail.mit.edu As compu

                Add to Reading List

                Source URL: dimacs.rutgers.edu

                - Date: 2004-05-05 09:44:02
                  10One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

                  Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

                  Add to Reading List

                  Source URL: cups.cs.cmu.edu

                  Language: English - Date: 2007-06-08 09:53:29
                  UPDATE