Sciweavers

2648 search results - page 31 / 530
» Human Factors In Computer Security
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
HUC
2009
Springer
15 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
65
Voted
SIGCSE
2008
ACM
111views Education» more  SIGCSE 2008»
14 years 9 months ago
Improving computer science diversity through summer camps
Summer camps offer a ripe opportunity for increasing computer science diversity. This panel provides several examples of summer camps that specifically recruit from traditionally ...
Dennis P. Groth, Helen H. Hu, Betty Lauer, Hwajung...
HAID
2009
Springer
15 years 2 months ago
Evaluating Factors that Influence Path Tracing with Passive Haptic Guidance
A very common task in medical applications and motor-skill training is to trace a path. However, when designing a haptically guided interface, designers need to consider the choice...
Kurosh Zarei-nia, Xing-Dong Yang, Pourang Irani, N...
CSR
2009
Springer
15 years 4 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko