Sciweavers

2399 search results - page 23 / 480
» On Authentication between Human and Computer
Sort
View
149
Voted
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 3 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
130
Voted
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
119
Voted
CSCW
2004
ACM
15 years 9 months ago
Hiding and revealing in online poker games
Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to t...
Scott A. Golder, Judith S. Donath
126
Voted
HCI
2009
15 years 1 months ago
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
This paper presents a new kind of interaction between users and a tabletop. The table described is interactive and associated with tangible and traceable objects using RFID technol...
Sébastien Kubicki, Sophie Lepreux, Yoann Le...
108
Voted
CHI
2008
ACM
16 years 4 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...