Sciweavers

408 search results - page 49 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CHI
2009
ACM
14 years 8 months ago
The design of ViVA: a mixed-initiative visual vocabulary for aphasia
In this paper, we present the design of ViVA, a visual vocabulary for aphasia. Aphasia is an acquired language disorder that causes variability of impairments affecting individual...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Perry R....
SOUPS
2009
ACM
14 years 2 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 2 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
CCS
2007
ACM
14 years 2 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
CCS
2006
ACM
13 years 11 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth