Sciweavers

2648 search results - page 128 / 530
» Human Factors In Computer Security
Sort
View
CHI
2000
ACM
15 years 9 months ago
Storytelling with digital photographs
Photographs play a central role in many types of informal storytelling. This paper describes an easy-to-use device that enables digital photos to be used in a manner similar to pr...
Marko Balabanovic, Lonny L. Chu, Gregory J. Wolff
148
Voted
HCI
2009
15 years 2 months ago
Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World
Due to the increasing penetration of mobile phones even in poor communities, mobile-phone-enabled banking (m-banking) services are being increasingly targeted at the "unbanked...
Indrani Medhi, Aishwarya Ratan, Kentaro Toyama
WWW
2009
ACM
16 years 5 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja
FOCS
2007
IEEE
15 years 11 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
CHI
2000
ACM
15 years 9 months ago
Symmetric bimanual interaction
We present experimental work that explores the factors governing symmetric bimanual interaction in a two-handed task that requires the user to track a pair of targets, one target ...
Ravin Balakrishnan, Ken Hinckley