Sciweavers

24529 search results - page 501 / 4906
» Computing on Authenticated Data
Sort
View
CHI
2008
ACM
16 years 5 months ago
Impromptu: a new interaction framework for supporting collaboration in multiple display environments and its field evaluation fo
We present a new interaction framework for collaborating in multiple display environments (MDEs) and report results from a field study investigating its use in an authentic work s...
Jacob T. Biehl, William T. Baker, Brian P. Bailey,...
CHI
2005
ACM
16 years 5 months ago
Roomquake: embedding dynamic phenomena within the physical space of an elementary school classroom
Authentic practice in science requires access to phenomena. In this paper, we introduce RoomQuake, an application designed to foster the growth of a community of learning around s...
Tom Moher, Syeda Hussain, Tim Halter, Debi Kilb
CHI
2010
ACM
15 years 12 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
FSTTCS
2009
Springer
15 years 11 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
SERSCISA
2009
Springer
15 years 11 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...