Sciweavers

2648 search results - page 220 / 530
» Human Factors In Computer Security
Sort
View
HAPTICS
2005
IEEE
15 years 10 months ago
An Experiment on Tracking Surface Features with the Sensation of Slip
This paper describes the last of three experiments that investigate relative motion between a surface and the fingertip (slip) as part of a larger program of research on “finger...
Mark A. Salada, J. Edward Colgate, Peter M. Vishto...
CSCW
2004
ACM
15 years 9 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
FPL
2004
Springer
119views Hardware» more  FPL 2004»
15 years 8 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
CSREASAM
2008
15 years 5 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
USS
2004
15 years 5 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...