A pictorial communication framework for inclusion. A picture can tell a thousand words; many people with an intellectual disability can only communicate with pictures and are otherwise isolated. This project will research how computers can understand and facilitate a rich pictorial communication between people and person to machine, thereby supporting inclusion. This will be achieved by inclusively co-designing with people with ID and members of the community: a) an audio-visual accessible searc ....A pictorial communication framework for inclusion. A picture can tell a thousand words; many people with an intellectual disability can only communicate with pictures and are otherwise isolated. This project will research how computers can understand and facilitate a rich pictorial communication between people and person to machine, thereby supporting inclusion. This will be achieved by inclusively co-designing with people with ID and members of the community: a) an audio-visual accessible search tool, b) a pictorial communication device, and c) a visual inclusive social network. These applications will inform future innovations for everyone, and allow citizens with ID to access online information, participate in community activities and be included in the workplace.Read moreRead less
Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that hu ....Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.Read moreRead less