Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
The use of functional magnetic resonance imaging (fMRI) to measure functional connectivity among brain areas has the potential to identify neural networks associated with particul...
Michael A. Silver, Ayelet N. Landau, Thomas Z. Lau...
In the Shared Space project, we explore, innovate, design and evaluate future computing environments that will radically enhance interaction between human and computers as well as...
Mark Billinghurst, Ivan Poupyrev, Hirokazu Kato, R...