Sciweavers

12478 search results - page 251 / 2496
» Secure Interaction Design
Sort
View
VLSID
2009
IEEE
110views VLSI» more  VLSID 2009»
16 years 5 months ago
Security and Dependability of Embedded Systems: A Computer Architects' Perspective
Jörg Henkel, Roshan G. Ragel, Sri Parameswara...
CHI
1998
ACM
15 years 8 months ago
Adapting User Interface Design Methods to the Design of Educational Activities
considered simply, but a more complex evaluation of the effects of performing the tasks. For example, an educational activity that learners complete quickly and accurately is of no...
Clayton Lewis, Cathy Brand, Gina Cherry, Cyndi Rad...
WPES
2005
ACM
15 years 10 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
148
Voted
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 9 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
127
Voted
CHI
2006
ACM
16 years 4 months ago
Participatory design in emergency medical service: designing for future practice
We describe our research--its approach, results and products--on Danish emergency medical service (EMS) field or "pre-hospital" work in minor and major incidents. We dis...
Margit Kristensen, Morten Kyng, Leysia Palen