Sciweavers

1018 search results - page 72 / 204
» Remote User Authentication Using Public Information
Sort
View
CG
2004
Springer
13 years 8 months ago
Refereed digital publication of computer graphics educational materials
Computer Graphics as a discipline has undergone drastic modifications over the past decades. Indeed the phenomenal progress in both the technical and digital art domains requires ...
Frederico C. Figueiredo, Dena Elisabeth Eber, Joaq...
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
13 years 3 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...
EXPCS
2007
14 years 21 hour ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...
ISMIR
2004
Springer
107views Music» more  ISMIR 2004»
14 years 1 months ago
Survey Of Music Information Needs, Uses, And Seeking Behaviours: Preliminary Findings
User studies focusing upon real-life music information needs, uses and seeking behaviours are still very scarce in the music information retrieval (MIR) and music digital library ...
Jin Ha Lee, J. Stephen Downie
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...