Sciweavers

1018 search results - page 49 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2008
ACM
14 years 8 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
PERVASIVE
2006
Springer
13 years 8 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
APN
2008
Springer
13 years 10 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
AVI
2008
13 years 10 months ago
How coherent environments support remote gestures
Previous studies have demonstrated the importance of providing users with a coherent environment across distant sites. To date, it remains unclear how such an environment affects ...
Naomi Yamashita, Keiji Hirata, Toshihiro Takada, Y...
PCM
2004
Springer
118views Multimedia» more  PCM 2004»
14 years 1 months ago
Reach-Through-the-Screen: A New Metaphor for Remote Collaboration
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...