Sciweavers

152
Voted
SPW
2000
Springer
15 years 7 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SPW
2000
Springer
15 years 7 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
103
Voted
SPW
2000
Springer
15 years 7 months ago
Making Sense of Specifications: The Formalization of SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
CHI
1995
ACM
15 years 7 months ago
Virtual Reality on a WIM: Interactive Worlds in Miniature
This paper explores a user interface technique which augments an immersive head tracked display with a hand-held miniature copy of the virtual environment. We call this interface ...
Richard Stoakley, Matthew Conway, Randy F. Pausch