Sciweavers

574 search results - page 68 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
FC
2009
Springer
142views Cryptology» more  FC 2009»
14 years 4 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
ICMI
2010
Springer
152views Biometrics» more  ICMI 2010»
13 years 8 months ago
Vlogcast yourself: nonverbal behavior and attention in social media
We introduce vlogs as a type of rich human interaction which is multimodal in nature and suitable for new largescale behavioral data analysis. The automatic analysis of vlogs is u...
Joan-Isaac Biel, Daniel Gatica-Perez
SOUPS
2009
ACM
14 years 4 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
EUROMICRO
1999
IEEE
14 years 2 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
ACSAC
2001
IEEE
14 years 1 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel