Sciweavers

376 search results - page 31 / 76
» Teaching context in information security
Sort
View
UIALL
2004
Springer
14 years 1 months ago
A Question of Realism
Abstract. We present the results of an exploratory study investigating the feasibility of using multimedia software to teach life skills to adults with learning difficulties. As a ...
Richard Hetherington, Alison Crerar, Phil Turner
CHI
2003
ACM
14 years 8 months ago
Designing an integrated review sheet for an electronic textbook
In this paper, we present findings and design decisions arisen while designing a review sheet within the confines of a pre-existing digital textbook, AdaptiveBook. Through user st...
Neema Moraveji, Abigail Travis, Maura Bidinost, Ma...
SOUPS
2009
ACM
14 years 2 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...
WWW
2005
ACM
14 years 8 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
IWDW
2005
Springer
14 years 1 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon