Sciweavers

2648 search results - page 189 / 530
» Human Factors In Computer Security
Sort
View
NDSS
1999
IEEE
15 years 9 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
HRI
2009
ACM
15 years 11 months ago
Providing route directions: design of robot's utterance, gesture, and timing
Providing route directions is a complicated interaction. Utterances are combined with gestures and pronounced with appropriate timing. This study proposes a model for a robot that...
Yusuke Okuno, Takayuki Kanda, Michita Imai, Hirosh...
151
Voted
CCS
2007
ACM
15 years 10 months ago
Privacy preserving error resilient dna searching through oblivious automata
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and...
Juan Ramón Troncoso-Pastoriza, Stefan Katze...
124
Voted
CHI
2008
ACM
16 years 5 months ago
Increasing the utility of quantitative empirical studies for meta-analysis
Despite the long history and consistent use of quantitative empirical methods to evaluate information visualization techniques and systems, our understanding of interface use rema...
Heidi Lam, Tamara Munzner
CHI
2004
ACM
16 years 5 months ago
What a to-do: studies of task management towards the design of a personal task list manager
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked ...
Victoria Bellotti, Brinda Dalal, Nathaniel Good, P...