Sciweavers

221 search results - page 20 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
USENIX
2003
13 years 9 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
TABLETOP
2008
IEEE
14 years 2 months ago
Presenting using two-handed interaction in open space
Based on recent demonstrations of low-cost, infrared-based point tracking, we explore two-handed, surface-less interaction for presentation. On both hands, thumb and index finger...
Luc Vlaming, Jasper Smit, Tobias Isenberg
CCS
2003
ACM
14 years 1 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 7 days ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
StateSnap: A Snapshot-based Interface for State-Reproductable Operation of Networked Appliances
This paper describes a snapshot-based interface for networked appliances operations that allows users to store and reproduce the conditions of media contents in those appliances b...
Naohiko Kohtake, Takeshi Iwamoto, Genta Suzuki, Sh...