Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Fundamental to the design of visual languages are the goals of facilitating communication between people and computers, and between people and other people. The Object Block Progr...
Jason E. Robbins, David J. Morley, David F. Redmil...
Abstract. We present a study which compares human-human computermediated tutoring with two computer tutoring systems based on the same materials but differing in the type of feedba...
Myroslava Dzikovska, Natalie B. Steinhauser, Johan...
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...