Sciweavers

8655 search results - page 158 / 1731
» Challenges for Trusted Computing
Sort
View
69
Voted
TRUST
2009
Springer
15 years 4 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
C5
2004
IEEE
15 years 1 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
CHI
2009
ACM
15 years 10 months ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson
CHI
2009
ACM
15 years 10 months ago
Tangibles for children, : the challenges
A significant proportion of research in the field of tangible interaction involves children. A common aspiration is to offer benefits through tangibility, related to ease of use a...
Bieke Zaman, Vero Vanden Abeele, Panos Markopoulos...
CHI
2010
ACM
15 years 5 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner