Sciweavers

2648 search results - page 129 / 530
» Human Factors In Computer Security
Sort
View
EUROCRYPT
2009
Springer
16 years 5 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
CHI
2005
ACM
16 years 5 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
CHI
2004
ACM
16 years 5 months ago
The future of signs: interactive information, inexpensively!
We present an inexpensive, interactive ubiquitous computing system that supports information presentation on demand using a novel "card reading" interaction style. We�...
Aradhana Goel, Michael Higgins, Mickey McManus, Ma...
MHCI
2007
Springer
15 years 11 months ago
Effective learn-quiz generation for handheld devices
In this demonstration, we present a system that enables users to easily generate quizzes for mobile devices. With our program, they can create multiple choice tests and general qu...
Wolfgang Hürst, Sabine Jung, Martina Welte
HRI
2009
ACM
15 years 2 months ago
Are we living in a robot cargo cult?
We use the Cargo Cult metaphor to discuss visions, methods and communication of robot research. Essentially cargo cult involves performing of imitative rituals that are conducted ...
Ylva Fernaeus, Mattias Jacobsson, Sara Ljungblad, ...