Sciweavers

12478 search results - page 184 / 2496
» Secure Interaction Design
Sort
View
126
Voted
CHI
2006
ACM
16 years 4 months ago
Usability of interaction patterns
Interaction patterns are becoming an important method for bridging the gap between analysis and design in user-centered design. Recent studies, however, have indicated problems in...
Katarina Segerståhl, Timo Jokela
AGENTS
1998
Springer
15 years 8 months ago
Liability for Autonomous Agent Design
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Carey Heckman, Jacob O. Wobbrock
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 8 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
CHI
2008
ACM
16 years 4 months ago
Vocal interaction
This note discusses the design of an experimental API (application program interface) for vocal user interfaces. The emphasis is on component design which supports vocal interactio...
Sri Hastuti Kurniawan, Adam J. Sporka
EUROCRYPT
1994
Springer
15 years 8 months ago
Designated Confirmer Signatures
Abstract. We construct the first O(1)-size designated confirmer signatures (DCS) with security in the state-of-the-art model of Camenisch and Michels, Eurocrypt 2000, without rando...
David Chaum