Sciweavers

1018 search results - page 48 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2011
ACM
12 years 11 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
WWW
2002
ACM
14 years 8 months ago
A graphical user interface toolkit approach to thin-client computing
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a ...
Simon Lok, Steven Feiner, William M. Chiong, Yoav ...
ITSSA
2006
129views more  ITSSA 2006»
13 years 8 months ago
A MultiAgent System for Classifying Bioinformatics Publications
Abstract. A growing amounts of information are currently being generated and stored in the World Wide Web (WWW), in particular, researchers in any field can find a lot of publicati...
Eloisa Vargiu, Andrea Addis
JITECH
2010
117views more  JITECH 2010»
13 years 6 months ago
Understanding information disclosure behaviour in Australian Facebook users
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
USS
2008
13 years 10 months ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach