Sciweavers

8655 search results - page 158 / 1731
» Challenges for Trusted Computing
Sort
View
TRUST
2009
Springer
15 years 9 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
C5
2004
IEEE
15 years 6 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
CHI
2009
ACM
16 years 3 months ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson
CHI
2009
ACM
16 years 3 months ago
Tangibles for children, : the challenges
A significant proportion of research in the field of tangible interaction involves children. A common aspiration is to offer benefits through tangibility, related to ease of use a...
Bieke Zaman, Vero Vanden Abeele, Panos Markopoulos...
CHI
2010
ACM
15 years 10 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner