Sciweavers

12478 search results - page 189 / 2496
» Secure Interaction Design
Sort
View
WISEC
2010
ACM
15 years 8 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
ACMDIS
2006
ACM
15 years 9 months ago
Design documentaries: inspiring design research through documentary film
This paper shows how we can take inspiration and use techniques from documentary film in pursuing user research. Documentary filmmaking has a long history of portraying everyday l...
Bas Raijmakers, William W. Gaver, Jon Bishay
112
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
On the Assessment of the Interaction Quality of Users with Cerebral Palsy
This paper is the continuation of a series of related work about experimentation of alternative ways of interaction with computers for disabled people (concretely with users suffe...
Cesar Mauri, Toni Granollers, Agusti Solanas
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 9 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
JNW
2008
126views more  JNW 2008»
15 years 3 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe