Sciweavers

1018 search results - page 132 / 204
» Remote User Authentication Using Public Information
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
CIE
2008
Springer
13 years 8 months ago
Designing new interfaces for digital interactive television usable by older adults
The adoption of digital television (DTV) could be particularly attractive for older people if appropriately designed. Despite this, when new services and applicat...
Mark Rice, Norman Alm
CSCW
2006
ACM
14 years 1 months ago
What goes around comes around: an analysis of del.icio.us as social space
An emergent class of web applications blurs the boundary between single user application and online public space. Recently popular web applications like del.icio.us help manage in...
Kathy J. Lee
CIKM
2007
Springer
14 years 2 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
CSCW
2006
ACM
14 years 1 months ago
HomeNote: supporting situated messaging in the home
In this paper we describe a field trial designed to investigate the potential of remote, situated messaging within the home. Five households used our “HomeNote” device for app...
Abigail Sellen, Richard H. R. Harper, Rachel Eardl...