Sciweavers

12478 search results - page 332 / 2496
» Secure Interaction Design
Sort
View
CHI
2006
ACM
16 years 5 months ago
Theory and method for experience centered design
There is currently much interest in notions of experience-centered design in Human-Computer Interaction (HCI). A great deal of the research and practice in this area is at the bou...
Mark Blythe, Peter C. Wright, John C. McCarthy, Ol...
CHI
2009
ACM
16 years 5 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
SOUPS
2009
ACM
15 years 11 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 11 months ago
Responsiveness on the Interactive Grid
The Grid vision promises the secure and dynamic sharing of heterogeneous resources across the Internet. To date the emphasis has been on supercomputing scenarios where a relatively...
Colin Allison, Stuart D. J. Purdie, Alan Miller
DSN
2006
IEEE
15 years 11 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...