Sciweavers

2044 search results - page 358 / 409
» Personalized Context-Aware Presentation of Information to Mo...
Sort
View
CCS
2004
ACM
15 years 3 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
INFOCOM
2003
IEEE
15 years 3 months ago
Flow Aggregation for Enhanced TCP over Wide Area Wireless
Abstract— Throughout the world, GSM cellular mobile networks are being upgraded to support the “always-on” General Packet Radio Service (GPRS). Despite the apparent availabil...
Rajiv Chakravorty, Sachin Katti, Ian Pratt, Jon Cr...
CHI
2005
ACM
15 years 10 months ago
A gesture-based american sign language game for deaf children
We present a system designed to facilitate language development in deaf children. The children interact with a computer game using American Sign Language (ASL). The system consist...
Seungyon Claire Lee, Valerie L. Henderson, Harley ...
CCS
2004
ACM
15 years 1 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger