Sciweavers

158 search results - page 18 / 32
» Cognitive security for personal devices
Sort
View
FI
2010
175views more  FI 2010»
14 years 9 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
ICDIM
2007
IEEE
15 years 6 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
SPW
2004
Springer
15 years 5 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
PUC
2010
105views more  PUC 2010»
14 years 6 months ago
Interactive visual supports for children with autism
Interventions to support children with autism often include the use of visual supports, which are cognitive tools to enable learning and the production of language. Although visual...
Gillian R. Hayes, Sen H. Hirano, Gabriela Marcu, M...
SOUPS
2010
ACM
15 years 3 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...