Sciweavers

2399 search results - page 2 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2010
ACM
14 years 1 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
HUC
2007
Springer
13 years 11 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
FGR
1998
IEEE
96views Biometrics» more  FGR 1998»
13 years 11 months ago
Comparisons between Human and Computer Recognition of Faces
This paper reviews characteristics of human face recognition that should be reflected in any psychologically plausible computational model of face recognition. We then summarise r...
Vicki Bruce, A. Mike Burton, Peter J. B. Hancock
DPPI
2007
ACM
13 years 11 months ago
How interface agents affect interaction between humans and computers
Abstract. For many years, the HCI community has harbored a vision of interacting with intelligent, embodied computer agents. However, the reality of this vision remains elusive. Fr...
Jodi Forlizzi, John Zimmerman, Vince Mancuso, Sony...