Sciweavers

2648 search results - page 45 / 530
» Human Factors In Computer Security
Sort
View
CCS
2009
ACM
15 years 2 months ago
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering mult...
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P...
AUTOMOTIVEUI
2009
ACM
15 years 4 months ago
A cognitive schema approach to diagnose intuitiveness: an application to onboard computers
Intuitive use is met when prior knowledge is transferred to new task environments. The empirical fact that transfer relies on schemas led us to diagnose intuitiveness based on sch...
Sandrine Fischer, Makoto Itoh, Toshiyuki Inagaki
CHI
2011
ACM
14 years 1 months ago
Proxemic interactions in ubiquitous computing ecologies
An important challenge in ubiquitous computing (ubicomp) is to create techniques that allow people to seamlessly and naturally connect to and interact with the increasing number o...
Nicolai Marquardt
ATAL
2008
Springer
14 years 11 months ago
Artificial agents learning human fairness
Recent advances in technology allow multi-agent systems to be deployed in cooperation with or as a service for humans. Typically, those systems are designed assuming individually ...
Steven de Jong, Karl Tuyls, Katja Verbeeck
MSWIM
2005
ACM
15 years 3 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari