Sciweavers

1018 search results - page 63 / 204
» Remote User Authentication Using Public Information
Sort
View
CCS
2008
ACM
13 years 10 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ICIW
2008
IEEE
14 years 2 months ago
A Framework for Generic Internet-Based Information Notification
This paper introduces a framework to monitor information available dynamically on the Internet through web services, RSS feeds or dynamic HTML documents based on user defined crit...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
14 years 11 days ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
SOUPS
2009
ACM
14 years 2 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 1 months ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig