Sciweavers

1018 search results - page 78 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2005
ACM
14 years 8 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
INFOCOM
2011
IEEE
12 years 11 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
IV
2003
IEEE
111views Visualization» more  IV 2003»
14 years 1 months ago
A Model of Synchronous Collaborative Information Visualization
In this paper we describe a model of the process by which people solve problems using information visualization systems. The model was based on video analysis of forty dyads who p...
Gloria Mark, Keri Carpenter, Alfred Kobsa
MMMACNS
2010
Springer
13 years 6 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
JCP
2006
86views more  JCP 2006»
13 years 8 months ago
MapWiki: A Map-based Content Sharing System for Distributed Location-dependent Information
Abstract-- In this paper, we propose a new map-based content sharing system 'MapWiki' for ubiquitous content distribution. In MapWiki, users can publish location-dependen...
Yuuichi Teranishi, Junzo Kamahara, Shinji Shimojo