Sciweavers

694 search results - page 3 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
74
Voted
CHI
2002
ACM
15 years 9 months ago
In the lab and out in the wild: remote web usability testing for mobile devices
In this paper we discuss a pilot usability study using wireless Internet-enabled personal digital assistants (PDAs). We compared usability data gathered in traditional lab studies...
Sarah Waterson, James A. Landay, Tara Matthews
WISTP
2010
Springer
15 years 4 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 3 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
PUC
2008
146views more  PUC 2008»
14 years 9 months ago
Evaluating teamwork support in tabletop groupware applications using collaboration usability analysis
Tabletop groupware systems have natural advantages for collaboration, but they present a challenge for application designers because shared work and interaction progress in differe...
David Pinelle, Carl Gutwin
CHI
2005
ACM
15 years 9 months ago
A method to standardize usability metrics into a single score
Current methods to represent system or task usability in a single metric do not include all the ANSI and ISO defined usability aspects: effectiveness, efficiency & satisfactio...
Jeff Sauro, Erika Kindlund