Sciweavers

2648 search results - page 70 / 530
» Human Factors In Computer Security
Sort
View
MOBISYS
2009
ACM
15 years 10 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
MOBISYS
2008
ACM
15 years 9 months ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...
SPW
2005
Springer
15 years 3 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
CASSIS
2004
Springer
15 years 3 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
HRI
2009
ACM
15 years 4 months ago
Human-robot physical interaction with dynamically stable mobile robots
Human-Robot Physical Interaction is an important attribute for robots operating in human environments. The authors illustrate some basic physically interactive behaviors with dyna...
Umashankar Nagarajan, George Kantor, Ralph L. Holl...