Sciweavers

1018 search results - page 76 / 204
» Remote User Authentication Using Public Information
Sort
View
HCI
2009
13 years 5 months ago
Accessible User Interfaces in a Mobile Logistics System
Abstract. In this paper, we focus on ICTs for young people attending occupational rehabilitation and training. An important goal is to develop ICTs that decrease the need for readi...
Harald K. Jansson, Robert Bjærum, Riitta Hel...
WWW
2007
ACM
14 years 8 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
ESWS
2010
Springer
13 years 6 months ago
DSMW: Distributed Semantic MediaWiki
DSMW is an extension to Semantic Mediawiki (SMW), it allows to create a network of SMW servers that share common semantic wiki pages. DSMW users can create communication channels b...
Hala Skaf-Molli, Gérôme Canals, Pasca...
ACSAC
2005
IEEE
14 years 1 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
CCGRID
2004
IEEE
13 years 12 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura