Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the Fire
- Subigya Nepal,
- Javier Hernandez,
- Robert Lewis,
- Ahad Chaudhry,
- Brian Houck,
- Eric Knudsen,
- Raul Rojas,
- Ben Tankus,
- Hemma Prafullchandra,
- Mary Czerwinski
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW1Article No.: 27, Pages 1–35https://doi.org/10.1145/3637304As concerns about employee burnout and skilled staff shortages in cybersecurity grow, our study aims to better understand the contributing factors to burnout in this field. Utilizing a mixed-methods approach, we analyze self-reported job and personal ...
- Work in ProgressApril 2023
Workplace Rhythm Variability and Emotional Distress in Information Workers
- Subigya Kumar Nepal,
- Javier Hernandez,
- Judith Amores Fernandez,
- Mehrab Bin Morshed,
- Robert Lewis,
- Hemma Prafullchandra,
- Mary P Czerwinski
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 321, Pages 1–8https://doi.org/10.1145/3544549.3585626Regularity in daily activities has been linked to positive well-being outcomes, but previous studies have mainly focused on clinical populations and traditional daily activities such as sleep and exercise. This research extends prior work by examining ...
- rfcMay 2013
RFC 6955: Diffie-Hellman Proof-of-Possession Algorithms
This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the ...
- rfcJuly 2000
RFC2875: Diffie-Hellman Proof-of-Possession Algorithms
This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair. This behavior is needed for such operations as creating the signature of a PKCS #10 certification request. These algorithms are designed ...
- ArticleDecember 1997
Going beyond the sandbox: an overview of the new security architecture in the javaTM development Kit 1.2
This paper describes the new security architecture that has been implemented aspart of JDK1.2, the forthcoming JavaTM Development Kit. In going beyond the sandbox security model in the original release of Java, JDK1.2 provides fine-grained access ...