" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …
commonly used to do so. However, it has been shown that deploying it in a truly secure …
Privacy information in a positive credit system
A positive credit history and rating help consumers with good payment history to get lower
interest rates, greater flexibility for credit, as well as loans with longer payment terms. In …
interest rates, greater flexibility for credit, as well as loans with longer payment terms. In …
Deployment method of virtual machine cluster based on energy minimization and graph cuts theory
Z Peng, B Xu, D Cui, W Lin… - 2015 10th International …, 2015 - ieeexplore.ieee.org
A deployment method had been constructed for virtual machine cluster based on energy
minimization and graph cut theory. First, virtual machine cluster was described by energy …
minimization and graph cut theory. First, virtual machine cluster was described by energy …
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility
S Prinz, S Schmidt, M Koschuch, A Glaser… - E-Business and …, 2016 - Springer
Abstract The Transport Layer Security (TLS) protocol is still the de-facto standard for secure
network connections over an insecure medium like the Internet. But its flexibility concerning …
network connections over an insecure medium like the Internet. But its flexibility concerning …
Usable security and privacy challenges with disruptive technologies
K Krombholz-Reindl - 2016 - repositum.tuwien.at
In the current age, disruptive technologies are proliferating rapidly and a plethora of devices
is interconnected and exchanges data. This always-online paradigm poses significant …
is interconnected and exchanges data. This always-online paradigm poses significant …
Speaking in tongues practical evaluation of TLS cipher suites compatibility
M Koschuch, T Fruhwirth, A Glaser… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol is still the de-facto standard for secure network
connections over an insecure medium like the internet. But its flexibility concerning the …
connections over an insecure medium like the internet. But its flexibility concerning the …
Sharing Privacy Information in Credit Analysis Environment
Credit analysis is used by financial companies to grant credit to customers. The analysis is
expensive, bureaucratic, and requires the collection of customer personal information …
expensive, bureaucratic, and requires the collection of customer personal information …