Sciweavers

1018 search results - page 36 / 204
» Remote User Authentication Using Public Information
Sort
View
TEI
2010
ACM
115views Hardware» more  TEI 2010»
14 years 4 months ago
The peppermill: a human-powered user interface device
A human-powered user interface device sources its power from the physical effort required to operate it. This paper describes a technique by which a geared DC motor and a simple c...
Nicolas Villar, Steve Hodges
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 9 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
MDAI
2007
Springer
14 years 3 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
RTCSA
2007
IEEE
14 years 3 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
MM
2004
ACM
145views Multimedia» more  MM 2004»
14 years 2 months ago
BiReality: mutually-immersive telepresence
BiReality (a.k.a. Mutually-Immersive Telepresence) uses a teleoperated robotic surrogate to provide an immersive telepresence system for face-to-face interactions. Our goal is to ...
Norman P. Jouppi, Subu Iyer, Stan Thomas, April Sl...