Despite its popularity, the classic pinch-to-zoom gesture used in modern multi-touch interfaces has drawbacks: specifically, the need to support an extended range of scales and the need to keep content within the view window on the display can result in the need to clutch and pan. In two formative studies of unimanual and bimanual pinch-to-zoom, we found… (More)
Multi-touch interaction on mobile devices typically consists of taps and swipes Simple gestures that don't exploit the full range of technical and human capabilities. Some devices offer more sophisticated, expert-level gestures, but these haven't yet been widely adopted. To determine what factors might be preventing widespread adoption of expert-level… (More)
DEAN'S HONOUR LIST publications peer-reviewed conference proceedings All reviewed and accepted using the same process and criteria, regardless of page length. Adoiraccourcix: multi-touch command selection using finger identification. Proc. of. IHM'14, 26e conférence francophone sur l'Interaction Homme-Machine. (French Text) 28-37. Interactive public ambient… (More)
Existing processes and methods for incident handling are geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. Research has shown that to adapt incident handling to cloud computing environments, cloud customers must establish clarity about their requirements on Cloud Service Providers (CSPs) for… (More)
In this work, we present a simple, yet effective and practical scheme to improve the security of stored password hashes, increasing the difficulty to crack passwords and exposing cracking attempts. We utilize a hardware-dependent function (HDF), such as a physically unclonable function (PUF) or a hardware security module (HSM), at the authentication server… (More)
PROBLEM SOLUTION /etc/master.passwd root:$1$hnHUw50a$tPdv5HZRsDP46FtsW8eXD … root: RootPwrd1 /etc/master.passwd root:$1$8rki9CdA$d50HMxCeEP5sWseX14fYz … root: s1mplePass If an attacker gets ahold of master.passwd Reveals ersatzpassword instead of true user password No noticeable difference in password hash file 2. Generate new salt and hash root: 8rki9CdA… (More)
PROBLEM 1 2 1 ! 1 ! Conflict Equilibrium Perceived Equilibriums In order to use deception as a viable information security defensive mechanism, one must properly analyze the conflict at hand. There is little work that analyzes the use of deception as a strategic defensive mechanism in computing systems. A hypergame is a game-theoretic conflict model where… (More)
(2014). Adoiraccourcix: multi-touch command selection using finger identification. Proc. of. IHM'14, 26e conférence francophone sur l'Interaction Homme-Machine. (French Text) 28-37. (2004). Interactive public ambient displays: transitioning from implicit to explicit, public to personal, interaction with multiple users.