Sciweavers

2399 search results - page 41 / 480
» On Authentication between Human and Computer
Sort
View
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 3 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
NDSS
2002
IEEE
15 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
CHI
2007
ACM
15 years 10 months ago
The relationship between accessibility and usability of websites
Accessibility and usability are well established concepts for user interfaces and websites. Usability is precisely defined, but there are different approaches to accessibility. In...
Helen Petrie, Omar Kheir
ACMACE
2007
ACM
15 years 1 months ago
The spinning screen: a movable experience between virtual and real
In screen-based experiences, the screen itself can become the physical device used for interaction. The "move-ability" of the screen affords interactivity between the sc...
Hyun-Jean Lee, Ali Mazalek, Kirti Goel
CHI
2003
ACM
15 years 10 months ago
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration
A tension exists between designers' comfort with physical artifacts and the need for effective remote collaboration: physical objects live in one place. Previous research and...
Katherine Everitt, Scott R. Klemmer, Robert Lee, J...