Sciweavers

1018 search results - page 70 / 204
» Remote User Authentication Using Public Information
Sort
View
HCI
2007
13 years 9 months ago
Using Speech Recognition and Intelligent Search Tools to Enhance Information Accessibility
Access to spoken information presents challenges in educational, work, and public settings for many individuals. Speech Recognition technology offers a potential strategy for incre...
Keith Bain, Jason Hines, Pawan Lingras, Yumei Qin
WCNC
2010
IEEE
14 years 21 hour ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 2 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
ACMDIS
2010
ACM
13 years 8 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
13 years 11 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel