Blog
About

123
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Designing Interactive Secure Systems: Workshop at British HCI 2012

      , ,

      The 26th BCS Conference on Human Computer Interaction (HCI)

      Human Computer Interaction

      12 - 14 September 2012

      British HCI, HCI 2012, Designing Interactive Secure Systems, DISS2012

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Preface to the proceedings of Designing Interactive Secure Systems: Workshop at British HCI 2012, held at the University of Birmingham on 11th September 2012

          Related collections

          Author and article information

          Contributors
          Conference
          September 2012
          September 2012
          : 1-2
          Affiliations
          Department of Computer Science

          University of Oxford
          Information Security Group

          Royal Holloway University of London
          Article
          10.14236/ewic/HCI2012.70
          © Shamal Faily et al. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

          This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

          The 26th BCS Conference on Human Computer Interaction
          HCI
          26
          Birmingham, UK
          12 - 14 September 2012
          Electronic Workshops in Computing (eWiC)
          Human Computer Interaction
          Product
          Product Information: 1477-9358BCS Learning & Development
          Self URI (journal page): https://ewic.bcs.org/
          Categories
          Electronic Workshops in Computing

          Comments

          Comment on this article