Sciweavers

182 search results - page 19 / 37
» End-User Privacy in Human-Computer Interaction
Sort
View
CHI
2008
ACM
14 years 8 months ago
Access control by testing for shared knowledge
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
OZCHI
2006
ACM
14 years 1 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
HUC
2003
Springer
14 years 26 days ago
The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness
Traditional techniques for balancing privacy and awareness in video media spaces, like blur filtration, have been proven to be ineffective for compromising home situations involvin...
Carman Neustaedter, Saul Greenberg
HUC
2007
Springer
14 years 1 months ago
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM
We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on I...
Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. ...
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell