LEADER 04281nam 22006975 450 001 9910483524903321 005 20251113210909.0 010 $a3-030-67108-9 024 7 $a10.1007/978-3-030-67108-2 035 $a(CKB)4100000011728431 035 $a(DE-He213)978-3-030-67108-2 035 $a(MiAaPQ)EBC6461888 035 $a(PPN)253253748 035 $a(EXLCZ)994100000011728431 100 $a20210121d2021 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer-Human Interaction Research and Applications $eSecond International Conference, CHIRA 2018, Seville, Spain, September 19-21, 2018 and Third International Conference, CHIRA 2019, Vienna, Austria, September 20-21, 2019, Revised Selected Papers /$fedited by Maria Jose Escalona, Andres Jimenez Ramirez, Hugo Plácido Silva, Larry Constantine, Markus Helfert, Andreas Holzinger 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XI, 143 p. 59 illus., 27 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1351 300 $aIncludes index. 311 08$a3-030-67107-0 327 $aDisplay Placement and Design: Impact on Engagement with Social Object Labels in a Gallery Environment -- Learning from Errors Designing Assistive Technology -- Empowering Citizen-Environment Interaction vs. Importunate Computer-Dominated Interaction: Let's Reset the Priorities! -- Computer-Human Interaction in Music Composition through Petri Nets -- Through the Looking Glass: Designing Agents for MAS based Shape-shifting Technology using the STEAM Approach -- Randomised Controlled Cross-over Trial Measuring Brain-Computer Interface Metrics to Characterise the User Experience of Search Engines When Ambiguous Search Queries Are Used -- Taxonomized Auditory Distractions with Varying Intensity Levels and Their Effect on a Visual P300 Speller While Utilising Low-cost Off-the-Shelf Equipment. 330 $aThis book constitutes selected papers of the Second International Conference on Computer-Human Interaction Research and Applications, CHIRA 2018, held in Seville, Spain, in September 2018, and Third International Conference on Computer-Human Interaction Research and Applications, CHIRA 2019, held in Vienna, Austria, in September 2019. The 7 full papers presented in this book were carefully reviewed and selected from 28 submissions for CHIRA 2018 and 36 submissions for CHIRA 2019. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on computer-human interaction, including Interaction design, human factors, entertainment, cognition, perception, user-friendly software and systems, pervasive technologies and interactive devices. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1351 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aArtificial intelligence 606 $aApplication software 606 $aComputer networks 606 $aSoftware engineering 606 $aUser Interfaces and Human Computer Interaction 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aSoftware Engineering 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 14$aUser Interfaces and Human Computer Interaction. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 676 $a005.437 702 $aEscalona$b Mari?a Jose? 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483524903321 996 $aComputer-Human Interaction Research and Applications$92533130 997 $aUNINA LEADER 04912nam 22008535 450 001 9910484938003321 005 20251226195836.0 010 $a3-540-68793-9 024 7 $a10.1007/11957454 035 $a(CKB)1000000000283969 035 $a(SSID)ssj0000319554 035 $a(PQKBManifestationID)11225040 035 $a(PQKBTitleCode)TC0000319554 035 $a(PQKBWorkID)10339725 035 $a(PQKB)11487523 035 $a(DE-He213)978-3-540-68793-1 035 $a(MiAaPQ)EBC3068643 035 $a(PPN)123140110 035 $a(BIP)34164598 035 $a(BIP)13947295 035 $a(EXLCZ)991000000000283969 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy Enhancing Technologies $e6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers /$fedited by George Danezis, Philippe Golle 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (VIII, 434 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4258 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-68790-4 320 $aIncludes bibliographical references and index. 327 $a6th Workshop on Privacy Enhancing Technologies -- Privacy for Public Transportation -- Ignoring the Great Firewall of China -- Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook -- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks -- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management -- Privacy Injector ? Automated Privacy Enforcement Through Aspects -- A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises -- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique -- Protecting Privacy with the MPEG-21 IPMP Framework -- Personal Rights Management ? Taming Camera-Phones for Individual Privacy Enforcement -- Improving Sender Anonymity in a Structured Overlay with Imprecise Routing -- Selectively Traceable Anonymity -- Valet Services: Improving Hidden Servers with a Personal Touch -- Blending Different Latency Traffic with Alpha-mixing -- Private Resource Pairing -- Honest-Verifier Private Disjointness Testing Without Random Oracles -- A Flexible Framework for Secret Handshakes -- On the Security of the Tor Authentication Protocol -- Optimal Key-Trees for Tree-Based Private Authentication -- Simple and Flexible Revocation Checking with Privacy -- Breaking the Collusion Detection Mechanism of MorphMix -- Linking Anonymous Transactions: The Consistent View Attack -- Preserving User Location Privacy in Mobile Data Management Infrastructures -- The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections. The 24 revised full papers present novel research on all theoretical and practical aspects of privacy technologies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4258 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aInformation storage and retrieval systems 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aInformation Storage and Retrieval 606 $aComputers and Society 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aData protection. 615 0$aInformation storage and retrieval systems. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aInformation Storage and Retrieval. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a005.8 701 $aDanezis$b George$f1979-$01752545 701 $aGolle$b Philippe$01750372 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484938003321 996 $aPrivacy enhancing technologies$94187867 997 $aUNINA