Sciweavers

370 search results - page 45 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
IUI
2005
ACM
14 years 1 months ago
A framework for designing intelligent task-oriented augmented reality user interfaces
A task-oriented space can benefit from an augmented reality interface that layers the existing tools and surfaces with useful information to make cooking more easy, safe and effic...
Leonardo Bonanni, Chia-Hsun Lee, Ted Selker
ACMIDC
2009
13 years 12 months ago
Petimo: safe social networking robot for children
"Petimo" is an interactive robotic toy designed to protect children from potential risks in social networks and the virtual world and helps them to make a safely connect...
Adrian David Cheok, Owen Noel Newton Fernando, Cha...
CHI
2010
ACM
14 years 1 months ago
Trained to accept?: a field experiment on consent dialogs
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Rainer Böhme, Stefan Köpsell
ACSAC
2010
IEEE
13 years 6 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 2 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee