Sciweavers

1018 search results - page 156 / 204
» Remote User Authentication Using Public Information
Sort
View
NLDB
2007
Springer
14 years 2 months ago
A Lightweight Approach to Semantic Annotation of Research Papers
This paper presents a novel application of a semantic annotation system, named Cerno, to analyze research publications in electronic format. Specifically, we address the problem of...
Nicola Zeni, Nadzeya Kiyavitskaya, Luisa Mich, Joh...
PAKM
2004
13 years 9 months ago
Automatic Generation of Taxonomies from the WWW
In this paper we present a methodology to extract information from the Web to build a taxonomy of terms and Web resources for a given domain. This taxonomy represents a hierarchy o...
David Sánchez, Antonio Moreno
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CCS
2009
ACM
14 years 16 days ago
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering mult...
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P...
WWW
2005
ACM
14 years 8 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin