This paper describes a multi-national study evaluating the perceived usefulness and perceived ease of use of Ambient Intelligence (AmI) applications in office environments. In a fi...
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...