Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
Based on recent demonstrations of low-cost, infrared-based point tracking, we explore two-handed, surface-less interaction for presentation. On both hands, thumb and index finger...
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
This paper describes a snapshot-based interface for networked appliances operations that allows users to store and reproduce the conditions of media contents in those appliances b...