Sciweavers

12478 search results - page 316 / 2496
» Secure Interaction Design
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
CCS
2004
ACM
15 years 10 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
ACSAC
2010
IEEE
15 years 2 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
127
Voted
CHI
2007
ACM
16 years 5 months ago
Range: exploring proxemics in collaborative whiteboard interaction
Range is an interactive whiteboard designed to support collocated, ad-hoc meetings. It employs proximity sensing to proactively transition between ambient and authoring modes, cle...
Wendy Ju, Brian Lee, Scott R. Klemmer
AAAI
2011
14 years 4 months ago
Effective End-User Interaction with Machine Learning
End-user interactive machine learning is a promising tool for enhancing human productivity and capabilities with large unstructured data sets. Recent work has shown that we can cr...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...