Author of the publication

"When i'm sixty-four...": are there real strategies for providing universal accessibility for the elderly.

, , , , , , , , and . CHI Extended Abstracts, page 694-695. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption., , , and . IACR Cryptology ePrint Archive, (2018)Studydesk: semi-immersive volumetric data analysis., , , , and . GRAPHITE, page 251-252. ACM, (2003)Two-Round Oblivious Linear Evaluation from Learning with Errors., , and . IACR Cryptol. ePrint Arch., (2020)Challenges for multimodal interfaces towards anyone anywhere accessibility: a position paper.. Workshop on Universal Accessibility of Ubiquitous Computing, page 26-27. ACM, (2001)UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions., , and . IACR Cryptology ePrint Archive, (2019)Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Emotional interaction.. CHI Extended Abstracts, page 676-677. ACM, (2003)Blink: observing thin slices of behavior to determine users' expectation towards task difficulty., , , , , , and . CHI Extended Abstracts, page 2299-2304. ACM, (2011)Game-based interaction technology for informal education in public settings., , , , , , and . SIGGRAPH Educators Program, page 23. ACM, (2005)A Traceable Ring Signature Scheme Based on Coding Theory., and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 387-403. Springer, (2019)