" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}

K Krombholz, W Mayer, M Schmiedecker… - 26th USENIX Security …, 2017 - usenix.org
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …

Privacy information in a positive credit system

ML Brocardo, CRD Rolt, JDS Dias… - … Journal of Grid …, 2017 - inderscienceonline.com
A positive credit history and rating help consumers with good payment history to get lower
interest rates, greater flexibility for credit, as well as loans with longer payment terms. In …

Deployment method of virtual machine cluster based on energy minimization and graph cuts theory

Z Peng, B Xu, D Cui, W Lin… - 2015 10th International …, 2015 - ieeexplore.ieee.org
A deployment method had been constructed for virtual machine cluster based on energy
minimization and graph cut theory. First, virtual machine cluster was described by energy …

What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility

S Prinz, S Schmidt, M Koschuch, A Glaser… - E-Business and …, 2016 - Springer
Abstract The Transport Layer Security (TLS) protocol is still the de-facto standard for secure
network connections over an insecure medium like the Internet. But its flexibility concerning …

Usable security and privacy challenges with disruptive technologies

K Krombholz-Reindl - 2016 - repositum.tuwien.at
In the current age, disruptive technologies are proliferating rapidly and a plethora of devices
is interconnected and exchanges data. This always-online paradigm poses significant …

Speaking in tongues practical evaluation of TLS cipher suites compatibility

M Koschuch, T Fruhwirth, A Glaser… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol is still the de-facto standard for secure network
connections over an insecure medium like the internet. But its flexibility concerning the …

Sharing Privacy Information in Credit Analysis Environment

ML Brocardo, RF Custodio, CR De Rolt… - 2015 Ninth …, 2015 - ieeexplore.ieee.org
Credit analysis is used by financial companies to grant credit to customers. The analysis is
expensive, bureaucratic, and requires the collection of customer personal information …