Sciweavers

5722 search results - page 442 / 1145
» Security Function Interactions
Sort
View
HCI
2009
15 years 2 months ago
Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments
This paper describes a multi-national study evaluating the perceived usefulness and perceived ease of use of Ambient Intelligence (AmI) applications in office environments. In a fi...
Carsten Röcker
CHI
2008
ACM
16 years 4 months ago
Biometric daemons: authentication via electronic pets
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Pamela Briggs, Patrick L. Olivier
CHI
2007
ACM
16 years 4 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CHI
2010
ACM
15 years 11 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
CHI
2011
ACM
14 years 8 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...