Sciweavers

1610 search results - page 32 / 322
» Identity Based Multisignatures
Sort
View
PERVASIVE
2009
Springer
14 years 3 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
ICCAD
1999
IEEE
79views Hardware» more  ICCAD 1999»
14 years 24 days ago
Improved interconnect sharing by identity operation insertion
This paper presents an approach to reduce interconnect cost by insertion of identity operations in a CDFG. Other than previous approaches, it is based on systematic pattern analys...
Dirk Herrmann, Rolf Ernst
HCI
2009
13 years 6 months ago
Social Practice: Becoming Enculturated in Human-Computer Interaction
Abstract. We present a new approach to the design, development and evaluation of embodied conversational agents (ECAs) that allows them to index identity through culturally and soc...
Justine Cassell
IEEEARES
2007
IEEE
14 years 2 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad