Sciweavers

12478 search results - page 56 / 2496
» Secure Interaction Design
Sort
View
CCS
2004
ACM
15 years 6 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
118
Voted
PSYCHNOLOGY
2008
75views more  PSYCHNOLOGY 2008»
15 years 2 months ago
Experience Design for Interactive Products: Designing Technology Augmented Urban Playgrounds for Girls
Recent technological developments have made it possible to apply experience design also in the field of highly interactive product design, an area where involvement of non-trivial...
Aadjan van der Helm, Walter A. Aprile, David V. Ke...
127
Voted
CHI
2007
ACM
16 years 2 months ago
Research through design as a method for interaction design research in HCI
For years the HCI community has struggled to integrate design in research and practice. While design has gained a strong foothold in practice, it has had much less impact on the H...
John Zimmerman, Jodi Forlizzi, Shelley Evenson
SEKE
2004
Springer
15 years 7 months ago
Applying Aspect-Orientation in Designing Security Systems: A Case Study
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...
116
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...