ACM Transactions on Graphics (TOG)
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
WebSplitter: a unified XML framework for multi-device collaborative Web browsing
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Using handhelds and PCs together
Communications of the ACM
A composable framework for secure multi-modal access to internet services from Post-PC devices
Mobile Networks and Applications
IEEE Internet Computing
The Personal Server: Changing the Way We Think about Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Information voyeurism: social impact of physically large displays on information privacy
CHI '03 Extended Abstracts on Human Factors in Computing Systems
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Public and Situated Displays: Social and Interactional Aspects of Shared Display Technologies (Cooperative Work, 2)
Securing a Remote Terminal Application with a Mobile Trusted Device
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Using Symbiotic Displays to View Sensitive Information in Public
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Hand-held computers can be better smart cards
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Middleware based user interface migration: implementation and evaluation
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
Enhancing web browsing security on public terminals using mobile composition
Proceedings of the 6th international conference on Mobile systems, applications, and services
Trustworthy and personalized computing on public kiosks
Proceedings of the 6th international conference on Mobile systems, applications, and services
Practical security for rural internet kiosks
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
Touch & interact: touch-based interaction of mobile phones with displays
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
A privacy-respectful input method for public terminals
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Vibrapass: secure authentication based on shared lies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SeCuUI: autocomplete your terminal input
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
SessionMagnifier: a simple approach to secure and convenient kiosk browsing
Proceedings of the 11th international conference on Ubiquitous computing
Securing interactive sessions using mobile device through visual channel and visual inspection
Proceedings of the 26th Annual Computer Security Applications Conference
An approach to introducing locality in remote attestation using near field communications
The Journal of Supercomputing
XICE windowing toolkit: Seamless display annexation
ACM Transactions on Computer-Human Interaction (TOCHI)
SessionJuggler: secure web login from an untrusted terminal using session hijacking
Proceedings of the 21st international conference on World Wide Web
Privacy-aware shared UI toolkit for nomadic environments
Software—Practice & Experience
Security in migratory interactive web applications
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
Don't queue up!: user attitudes towards mobile interactions with public terminals
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
Interaction techniques for creating and exchanging content with public displays
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using fake cursors to secure on-screen password entry
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.01 |
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals to handle personal data may compromise privacy. We present a system that enables users to access their applications and data securely using a combination of public terminals and a more trusted, personal device. Our system (i) provides users with capabilities to censor the public terminal display, so that it does not show private data; (ii) filters input events coming from the public terminal, so that maliciously injected keyboard/pointer events do not compromise privacy; and (iii) enables users to view personal information and perform data-entry via their personal device. A key feature of our system is that it works with unmodified applications. A prototype implementation of the system has been publicly released for Linux and Windows. The results arising from a pilot usability study based on this implementation are presented.