Sciweavers

77 search results - page 13 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ICS
2003
Tsinghua U.
14 years 17 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
VIS
2009
IEEE
304views Visualization» more  VIS 2009»
14 years 8 months ago
GL4D: A GPU-based Architecture for Interactive 4D Visualization
This paper describes GL4D, an interactive system for visualizing 2-manifolds and 3-manifolds embedded in four Euclidean dimensions and illuminated by 4D light sources. It is a tetr...
Alan Chu, Chi-Wing Fu, Andrew J. Hanson, Pheng-...
CSMR
1998
IEEE
13 years 11 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
UIST
2009
ACM
14 years 1 months ago
Integrated videos and maps for driving directions
While onboard navigation systems are gaining in importance, maps are still the medium of choice for laying out a route to a destination and for way finding. However, even with a ...
Billy Chen, Boris Neubert, Eyal Ofek, Oliver Deuss...