000 06073nam a22006735i 4500
001 978-3-030-85610-6
003 DE-He213
005 20240730203529.0
007 cr nn 008mamaa
008 210825s2021 sz | s |||| 0|eng d
020 _a9783030856106
_9978-3-030-85610-6
024 7 _a10.1007/978-3-030-85610-6
_2doi
050 4 _aQA76.9.U83
050 4 _aQA76.9.H85
072 7 _aUYZ
_2bicssc
072 7 _aCOM079010
_2bisacsh
072 7 _aUYZ
_2thema
082 0 4 _a005.437
_223
082 0 4 _a004.019
_223
245 1 0 _aHuman-Computer Interaction - INTERACT 2021
_h[electronic resource] :
_b18th IFIP TC 13 International Conference, Bari, Italy, August 30 - September 3, 2021, Proceedings, Part IV /
_cedited by Carmelo Ardito, Rosa Lanzilotti, Alessio Malizia, Helen Petrie, Antonio Piccinno, Giuseppe Desolda, Kori Inkpen.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXXXV, 744 p. 32 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v12935
505 0 _aLattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- Evidence Collection and Preservation System with Virtual Machine Monitoring -- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions -- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.-Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices -- FFT Program Generation for Ring LWE-based Cryptography -- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure -- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures -- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH -- Simple Matrix Signature Scheme -- Game Theory and Security Moving Target Defense for the CloudControl Game.
520 _aThe five-volume set LNCS 12932-12936 constitutes the proceedings of the 18th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2021, held in Bari, Italy, in August/September 2021. The total of 105 full papers presented together with 72 short papers and 70 other papers in these books was carefully reviewed and selected from 680 submissions. The contributions are organized in topical sections named: Part I: affective computing; assistive technology for cognition and neurodevelopment disorders; assistive technology for mobility and rehabilitation; assistive technology for visually impaired; augmented reality; computer supported cooperative work. Part II: COVID-19 & HCI; croudsourcing methods in HCI; design for automotive interfaces; design methods; designing for smart devices & IoT; designing for the elderly and accessibility; education and HCI; experiencing sound and music technologies; explainable AI. Part III: games and gamification; gesture interaction; human-centered AI; human-centered development of sustainable technology; human-robot interaction; information visualization; interactive design and cultural development. Part IV: interaction techniques; interaction with conversational agents; interaction with mobile devices; methods for user studies; personalization and recommender systems; social networks and social media; tangible interaction; usable security. Part V: user studies; virtual reality; courses; industrial experiences; interactive demos; panels; posters; workshops. The chapter 'Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training' is open access under a CC BY 4.0 license at link.springer.com. The chapter 'WhatsApp in Politics?! Collaborative Tools Shifting Boundaries' is open access under a CC BY 4.0 license at link.springer.com.
650 0 _aUser interfaces (Computer systems).
_911681
650 0 _aHuman-computer interaction.
_96196
650 0 _aComputer networks .
_931572
650 0 _aArtificial intelligence.
_93407
650 0 _aApplication software.
_9176454
650 1 4 _aUser Interfaces and Human Computer Interaction.
_931632
650 2 4 _aComputer Communication Networks.
_9176455
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aComputer and Information Systems Applications.
_9176456
700 1 _aArdito, Carmelo.
_eeditor.
_0(orcid)
_10000-0001-8993-9855
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176457
700 1 _aLanzilotti, Rosa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176458
700 1 _aMalizia, Alessio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176459
700 1 _aPetrie, Helen.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176460
700 1 _aPiccinno, Antonio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176461
700 1 _aDesolda, Giuseppe.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176462
700 1 _aInkpen, Kori.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176463
710 2 _aSpringerLink (Online service)
_9176464
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030856090
776 0 8 _iPrinted edition:
_z9783030856113
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v12935
_9176465
856 4 0 _uhttps://doi.org/10.1007/978-3-030-85610-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97544
_d97544