Sciweavers

2648 search results - page 176 / 530
» Human Factors In Computer Security
Sort
View
ISPA
2005
Springer
15 years 10 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
132
Voted
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
WWW
2004
ACM
16 years 5 months ago
Metadata co-development: a process resulting in metadata about technical assistance to educators
Metadata development can be challenging because the vocabulary should be flexible and extensible, widely applicable, interoperable, and both machine and human readable. We describ...
Michael B. Knapp, Sara Dexter, Robert McLaughlin
CHI
2009
ACM
16 years 5 months ago
An elementary social information foraging model
User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory...
Peter Pirolli
CHI
2009
ACM
16 years 5 months ago
Exploring the cognitive consequences of social search
To what extent can social interactions augment people's natural search experiences? What factors influence the decision to turn to a friend for help? Our paper presents the p...
Brynn M. Evans, Sanjay Kairam, Peter Pirolli