Sciweavers

1018 search results - page 159 / 204
» Remote User Authentication Using Public Information
Sort
View
IDTRUST
2009
ACM
14 years 2 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
SIMVIS
2007
13 years 9 months ago
Development of a Mixed Reality Device for Interactive On-Site Geo-visualization
This paper reports on the development of a novel mixed reality I/O device tailored to the requirements of interaction with geo-spatial data in the immediate environment of the use...
Volker Paelke, Claus Brenner
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CIKM
2010
Springer
13 years 6 months ago
CiteData: a new multi-faceted dataset for evaluating personalized search performance
Personalized search systems have evolved to utilize heterogeneous features including document hyperlinks, category labels in various taxonomies and social tags in addition to free...
Abhay Harpale, Yiming Yang, Siddharth Gopal, Daqin...
CHI
2011
ACM
12 years 11 months ago
Gestures in the wild: studying multi-touch gesture sequences on interactive tabletop exhibits
In this paper we describe our findings from a field study that was conducted at the Vancouver Aquarium to investigate how visitors interact with a large interactive table exhibi...
Uta Hinrichs, Sheelagh Carpendale