Sciweavers

1018 search results - page 94 / 204
» Remote User Authentication Using Public Information
Sort
View
EICS
2009
ACM
14 years 2 months ago
An empirical comparison of "wiimote" gun attachments for pointing tasks
We evaluated and compared four input methods using the Nintendo Wii Remote for pointing tasks. The methods used (i) the "A" button on top of the device, (ii) the "B...
Victoria McArthur, Steven J. Castellucci, I. Scott...
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 11 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
EFDBS
2000
13 years 9 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 2 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
WWW
2008
ACM
14 years 8 months ago
Webanywhere: enabling a screen reading interface for the web on any computer
People often use computers other than their own to access web content, but blind users are restricted to using computers equipped with expensive, special-purpose screen reading pr...
Jeffrey P. Bigham, Craig Prince, Richard E. Ladner