Sciweavers

2564 search results - page 355 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
CHI
2008
ACM
14 years 8 months ago
Multi-flick: an evaluation of flick-based scrolling techniques for pen interfaces
Multi-flick, which consists of repeated flick actions, has received media attention as an intuitive and natural document-scrolling technique for stylus based systems. In this pape...
Dzmitry Aliakseyeu, Pourang Irani, Andrés L...
CHI
2004
ACM
14 years 8 months ago
Pressure widgets
Current user interface widgets typically assume that the input device can only provide x-y position and binary button press information. Other inputs such as the continuous pressu...
Gonzalo Ramos, Matthew Boulos, Ravin Balakrishnan
MHCI
2009
Springer
14 years 2 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
HRI
2010
ACM
14 years 1 months ago
Mysterious machines
—Alan Turing proposed a test for the intelligence of machines in 1950 [1]. Despite great efforts, no computer has passed this test so far. Each year, chat bots compete for the Lo...
Billy Schonenberg, Christoph Bartneck