Sciweavers

12478 search results - page 351 / 2496
» Secure Interaction Design
Sort
View
CHI
2004
ACM
16 years 5 months ago
Evaluating interactive information retrieval systems: opportunities and challenges
Information retrieval or search plays an important role in a wide range of information management and electronic commerce tasks. In spite of the importance of information retrieva...
Nicholas J. Belkin, Susan T. Dumais, Jean Scholtz,...
WS
2006
ACM
15 years 11 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
182
Voted
I3E
2001
196views Business» more  I3E 2001»
15 years 6 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
EDUTAINMENT
2007
Springer
15 years 11 months ago
An Observational Study of Children Interacting with an Augmented Story Book
We present findings of an observational study investigating how young children interact with augmented reality story books. Children aged between 6 and 7 read and interacted with o...
Andreas Dünser, Eva Hornecker