Sciweavers

370 search results - page 44 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
OZCHI
2006
ACM
14 years 1 months ago
iSocialize: investigating awareness cues for a mobile social awareness application
Emerging technologies increasingly provide opportunities for creating and maintaining social relations with people even though separated by time or distance. However, it is still ...
Berith L. Andersen, Martin L. Jørgensen, Ul...
ACSAC
1999
IEEE
14 years 9 days ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
CCS
2008
ACM
13 years 10 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
HCI
2007
13 years 9 months ago
Designing Smart Living Objects - Enhancing vs. Distracting Traditional Human-Object Interaction
Abstract. To realize Weiser’s vision of ubiquitous computing, a popular approach has been to create so-called smart living objects, which are everyday objects in our living envir...
Pei-yu Chi, Jen-hao Chen, Shih-yen Liu, Hao-Hua Ch...