Sciweavers

1018 search results - page 38 / 204
» Remote User Authentication Using Public Information
Sort
View
CSE
2009
IEEE
14 years 19 days ago
Using Qtag to Extract Dominant Public Opinion in Very Large-Scale Conversation
— These days VLSC (Very Large-Scale Conversation) is a particular type of online conversation, that is large scale, public, text-based, many-to-many and persistent. The nature of...
Sung Eob Lee, Taeksoo Chun, Steve SangKi Han
ETRA
2010
ACM
233views Biometrics» more  ETRA 2010»
14 years 4 months ago
Estimating cognitive load using remote eye tracking in a driving simulator
We report on the results of a study in which pairs of subjects were involved in spoken dialogues and one of the subjects also operated a simulated vehicle. We estimated the driver...
Oskar Palinko, Andrew L. Kun, Alexander Shyrokov, ...
INFOCOM
2005
IEEE
14 years 2 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 3 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SEMWEB
2005
Springer
14 years 2 months ago
The Personal Publication Reader
This application demonstrates how to provide personalized, syndicated views on distributed web data using Semantic Web technologies. The application comprises four steps: The infor...
Fabian Abel, Robert Baumgartner, Adrian Brooks, Ch...