关注
Kent Seamons
Kent Seamons
Professor of Computer Science, Brigham Young University
在 cs.byu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Automated trust negotiation
WH Winsborough, KE Seamons, VE Jones
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
6932000
Document ranking and the vector-space model
DL Lee, H Chuang, K Seamons
IEEE software 14 (2), 67-75, 1997
6201997
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4222003
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3261995
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3142002
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2442001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2412001
Hidden credentials
JE Holt, RW Bradshaw, KE Seamons, H Orman
Proceedings of the 2003 ACM workshop on Privacy in the electronic society, 1-8, 2003
2312003
Concealing complex policies with hidden credentials
RW Bradshaw, JE Holt, KE Seamons
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2182004
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2162002
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
European Semantic Web Symposium, 342-356, 2004
1942004
A usability study of five {two-factor} authentication methods
K Reese, T Smith, J Dutson, J Armknecht, J Cameron, K Seamons
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 357-370, 2019
1922019
Logcrypt: forward security and public verification for secure audit logs
JE Holt, KE Seamons
Cryptology ePrint Archive, 2005
1922005
Multi-channel user authentication apparatus system and method
T van der Horst, K Seamons
US Patent 8,151,116, 2012
1652012
Adaptive trust negotiation and access control
T Ryutov, L Zhou, C Neuman, T Leithead, KE Seamons
Proceedings of the tenth ACM symposium on Access control models and …, 2005
1552005
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
1492003
Confused Johnny: when automatic encryption leads to confusion and mistakes
S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
1482013
Why Johnny still, still can't encrypt: Evaluating the usability of a modern PGP client
S Ruoti, J Andersen, D Zappala, K Seamons
arXiv preprint arXiv:1510.08555, 2015
1312015
Advanced Client/Server Authentication in TLS.
A Hess, J Jacobson, H Mills, R Wamsley, KE Seamons, B Smith
NDSS, 2002
1152002
" We're on the Same Page" A Usability Study of Secure Email Using Pairs of Novice Users
S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1082016
系统目前无法执行此操作,请稍后再试。
文章 1–20