Sciweavers

1018 search results - page 79 / 204
» Remote User Authentication Using Public Information
Sort
View
TEI
2009
ACM
92views Hardware» more  TEI 2009»
14 years 2 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
ACSAC
2000
IEEE
14 years 16 days ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
WWW
2010
ACM
13 years 8 months ago
QuickSuggest: character prediction on web appliances
As traditional media and information devices integrate with the web, they must suddenly support a vastly larger database of relevant items. Many devices use remote controls with o...
Ullas Gargi, Rich Gossweiler
MM
1993
ACM
126views Multimedia» more  MM 1993»
14 years 6 days ago
Phoneshell: The Telephone as Computer Terminal
This paper describes Phoneshell, a telephone based application providing remote voice access to personal desktop databases such as voice mail, email, calendar, and rolodex. Severa...
Chris Schmandt
ESORICS
2012
Springer
11 years 10 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...