Sciweavers

12478 search results - page 32 / 2496
» Secure Interaction Design
Sort
View
ESORICS
2008
Springer
15 years 3 months ago
New Considerations about the Correct Design of Turbo Fingerprinting Codes
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
CCS
2006
ACM
15 years 5 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
CHI
2010
ACM
15 years 8 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...
VLC
2008
146views more  VLC 2008»
15 years 1 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro