Sciweavers

1627 search results - page 255 / 326
» On context in authorization policy
Sort
View
NORDICHI
2004
ACM
14 years 2 months ago
Mobile probes
This paper describes a new digital user study tool called Mobile Probes. Mobile Probes arose from a need to develop contextual and dynamic self-documenting tools for studying peop...
Sami Hulkko, Tuuli Mattelmäki, Katja Virtanen...
ADHOCNOW
2004
Springer
14 years 2 months ago
Consensus with Unknown Participants or Fundamental Self-Organization
Abstract. We consider the problem of bootstrapping self-organized mobile ad hoc networks (MANET), i.e. reliably determining in a distributed and self-organized manner the services ...
David Cavin, Yoav Sasson, André Schiper
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
14 years 2 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...
CHI
2010
ACM
14 years 2 months ago
Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults
Tablet PCs are gaining popularity but many older adults still struggle with pointing, particularly with two error types: missing, landing and lifting outside the target bounds; an...
Karyn Moffatt, Joanna McGrenere
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 2 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam