Sciweavers

1018 search results - page 115 / 204
» Remote User Authentication Using Public Information
Sort
View
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
14 years 2 months ago
HELIOS system: A team of tracked robots for special urban search and rescue operations
Abstract— Fire brigades and special agencies are often demanded to operate for search and aid of human lives in extremely dangerous scenarios. It is very important to first veri...
Michele Guarnieri, Ryo Kurazume, Hiroshi Masuda, T...
CORR
2011
Springer
193views Education» more  CORR 2011»
12 years 11 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
IDTRUST
2010
ACM
14 years 25 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
JUCS
2008
147views more  JUCS 2008»
13 years 8 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
UIST
2010
ACM
13 years 5 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li