Sciweavers

12478 search results - page 226 / 2496
» Secure Interaction Design
Sort
View
EVOW
2004
Springer
15 years 9 months ago
Aesthetic Video Filter Evolution in an Interactive Real-Time Framework
A data-flow network-based interactive evolutionary design framework is presented which will provide a testbed for the development and exploration of a diverse range of visual arti...
Matthew Lewis
CHI
2007
ACM
16 years 4 months ago
Reality-based interaction: unifying the new generation of interaction styles
We are in the midst of an explosion of emerging human-computer interaction techniques that have redefined our understanding of both computers and interaction. We propose the notio...
Robert J. K. Jacob, Audrey Girouard, Leanne M. Hir...
SACRYPT
1999
Springer
15 years 8 months ago
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG). We describe the concept of a PRNG as a separate cryptographic primitive, and the...
John Kelsey, Bruce Schneier, Niels Ferguson
MHCI
2009
Springer
15 years 10 months ago
Flashlight interaction: a study on mobile phone interaction techniques with large displays
In this paper, we introduce Flashlight interaction, a new approach to light-based interaction between mobile phones and large screens by using the phone camera flashlight. Using a...
Alireza Sahami Shirazi, Christian Winkler, Albrech...
ASIACRYPT
2005
Springer
15 years 9 months ago
A Failure-Friendly Design Principle for Hash Functions
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
Stefan Lucks