Sciweavers

77 search results - page 4 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
AINA
2007
IEEE
14 years 1 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
CIKM
1999
Springer
13 years 11 months ago
Requirement-Based Data Cube Schema Design
On-line analytical processing (OLAP) requires e cient processing of complex decision support queries over very large databases. It is well accepted that pre-computed data cubes ca...
David Wai-Lok Cheung, Bo Zhou, Ben Kao, Hongjun Lu...
NORDICHI
2006
ACM
14 years 1 months ago
Tac-tiles: multimodal pie charts for visually impaired users
Tac-tiles is an accessible interface that allows visually impaired users to browse graphical information using tactile and audio feedback. The system uses a graphics tablet which ...
Steven A. Wall, Stephen A. Brewster
ERCIMDL
1999
Springer
121views Education» more  ERCIMDL 1999»
13 years 11 months ago
An Indexing, Browsing, Search and Retrieval System for Audiovisual Libraries
This paper describes an application which enables the computer-assisted generation of Dublin Core-based metadata descriptions and online digital visual summaries for videos. It is...
Jane Hunter, Jan Newmarch
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...