Sciweavers

15379 search results - page 237 / 3076
» Protecting users from
Sort
View
AAAI
2008
13 years 10 months ago
User Identification by Means of Sketched Stroke Features
We present preliminary results of using physical features of a user's sketching style, such as pen tilt and pressure, to identify a user from their sketched strokes.
Brian Eoff, Tracy Hammond
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 2 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
ECIS
2003
13 years 9 months ago
The impact of software patents on the structure of the software market - a simulation model
The issue of software patents is widely discussed in Europe today. The standard economic rationale for patents is to protect potential innovators from imitation, which ultimately ...
Norman Hoppen, Daniel Beimborn, Wolfgang Köni...
PKDD
2009
Springer
149views Data Mining» more  PKDD 2009»
14 years 2 months ago
Learning to Disambiguate Search Queries from Short Sessions
Web searches tend to be short and ambiguous. It is therefore not surprising that Web query disambiguation is an actively researched topic. To provide a personalized experience for ...
Lilyana Mihalkova, Raymond J. Mooney