Sciweavers

2454 search results - page 276 / 491
» Privacy in the Information and Communications Technologies
Sort
View
AUSAI
2006
Springer
15 years 5 months ago
Automatic Generation of Funny Cartoons Diary for Everyday Mobile Life
Abstract. The notable developments in pervasive and wireless technology enable us to collect enormous sensor data from each individual. With contextaware technologies, these data c...
Injee Song, Myung-Chul Jung, Sung-Bae Cho
CSCW
2008
ACM
15 years 3 months ago
Transactive memory in trauma resuscitation
This paper describes an ethnographic study conducted to explore the possibilities for future design and development of technological support for trauma teams. We videotaped 10 tra...
Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk,...
144
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
114
Voted
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 5 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
95
Voted
CSCW
2010
ACM
15 years 8 months ago
Throwing voices: the psychological impact of the spatial height of projected voices
Communication mediating technologies are throwing our voices away from our bodies in situations ranging from voice conference meetings to mass presentations. Physical height is kn...
Leila Takayama, Clifford Nass