Sciweavers

2648 search results - page 185 / 530
» Human Factors In Computer Security
Sort
View
126
Voted
JCP
2007
122views more  JCP 2007»
15 years 4 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
ICAT
2006
IEEE
15 years 10 months ago
Manipulation of Field of View for Hand-Held Virtual Reality
Today, hand-held computing and media devices are commonly used in our everyday lives. This paper assesses the viability of hand-held devices as effective platforms for “virtual r...
Jane Hwang, Jaehoon Jung, Gerard Jounghyun Kim
CHI
2005
ACM
16 years 5 months ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
119
Voted
CHI
2010
ACM
15 years 11 months ago
G-nome surfer: a tabletop interface for collaborative exploration of genomic data
Molecular and computational biologists develop new insights by gathering heterogeneous data from genomic databases and leveraging bioinformatics tools. Through a qualitative study...
Orit Shaer, Guy Kol, Megan Strait, Chloe Fan, Cath...
ACMIDC
2010
15 years 8 months ago
Digital Technologies and Marginalized Youth
Marginalization threatens basic issues of fairness and equal opportunity for a significant portion of children around the n this extended abstract, we frame the problem of margina...
Juan Pablo Hourcade, Natasha E. Bullock-Rest, Heid...