Sciweavers

89 search results - page 5 / 18
» Keystroke dynamics for user authentication
Sort
View
ASSETS
2007
ACM
13 years 11 months ago
SIBYLLE: a system for alternative communication adapting to the context and its user
In this paper, we describe the latest version of SIBYLLE, an AAC system that permits persons suffering from severe physical disabilities to enter text with any computer applicatio...
Tonio Wandmacher, Jean-Yves Antoine, Franck Poirie...
ACSAC
2005
IEEE
14 years 1 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
PERVASIVE
2007
Springer
14 years 1 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
IUI
2010
ACM
14 years 2 months ago
Usability guided key-target resizing for soft keyboards
Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support and space for larger graphical displays. On the other hand, becaus...
Asela Gunawardana, Tim Paek, Christopher Meek
ASIACRYPT
2004
Springer
14 years 1 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee