Sciweavers

1018 search results - page 61 / 204
» Remote User Authentication Using Public Information
Sort
View
COLCOM
2009
IEEE
14 years 28 min ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
AVI
2004
13 years 9 months ago
The challenge of information visualization evaluation
As the field of information visualization matures, the tools and ideas described in our research publications are reaching users. The reports of usability studies and controlled e...
Catherine Plaisant
WPES
2004
ACM
14 years 1 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
CHI
2011
ACM
12 years 11 months ago
Enhancing independence and safety for blind and deaf-blind public transit riders
Blind and deaf-blind people often rely on public transit for everyday mobility, but using transit can be challenging for them. We conducted semi-structured interviews with 13 blin...
Shiri Azenkot, Sanjana Prasain, Alan Borning, Emil...