Sciweavers

1018 search results - page 74 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDCSW
2002
IEEE
14 years 1 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ISWC
1998
IEEE
14 years 11 days ago
A Wearable Spatial Conferencing Space
Wearable computers provide constant access to computing and communications resources. In this paper we describe how the computing power of wearables can be used to provide spatial...
Mark Billinghurst, Jerry Bowskill, M. Jessop, Jaso...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
14 years 2 months ago
On-Demand Partial Schema Delivery for Multimedia Metadata
XML is a popular approach to interoperable exchange of Multimedia metadata between a wide range of devices. This paper explores extending the use of the Remote XML Exchange Protoc...
Stephen J. Davis, Ian S. Burnett
CHI
2009
ACM
14 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji