TY - GEN
T1 - CursorCamouflage
T2 - SIGGRAPH Asia 2012 Emerging Technologies, SA 2012
AU - Watanabe, Keita
AU - Higuchi, Fumito
AU - Inami, Masahiko
AU - Igarashi, Takeo
PY - 2012/12/1
Y1 - 2012/12/1
N2 - More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.
AB - More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.
UR - http://www.scopus.com/inward/record.url?scp=84871784571&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84871784571&partnerID=8YFLogxK
U2 - 10.1145/2407707.2407713
DO - 10.1145/2407707.2407713
M3 - Conference contribution
AN - SCOPUS:84871784571
SN - 9781450319126
T3 - SIGGRAPH Asia 2012 Emerging Technologies, SA 2012
BT - SIGGRAPH Asia 2012 Emerging Technologies, SA 2012
Y2 - 28 November 2012 through 1 December 2012
ER -