Sciweavers

1018 search results - page 120 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2008
ACM
14 years 8 months ago
Your place or mine?: visualization as a community component
Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. Th...
Catalina M. Danis, Fernanda B. Viégas, Jess...
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 8 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
SIGUCCS
2003
ACM
14 years 1 months ago
Using a course management system to create a training course for student employees
The User Services unit of Information Technologies at the University of Delaware operates nine public computing facilities and employs about 150 students who work as assistants in...
Cindy Guerrazzi, Kate Webster
EISWT
2007
13 years 9 months ago
Medical Acronym Disambiguation Using Online Sources
Hospitals produce millions of patient records consisting of clinical annotations containing extensive usage of abbreviations. The data in these clinical annotations are an excelle...
Janet Rajan, Karen C. Davis, Pawel Matykiewicz, Wl...
CHI
2010
ACM
14 years 2 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle