Sciweavers

211 search results - page 9 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ACCV
1995
Springer
13 years 11 months ago
An Integrated Model for Evaluating the Amount of Data Required for Reliable Recognition
—Many recognition procedures rely on the consistency of a subset of data features with a hypothesis as the sufficient evidence to the presence of the corresponding object. We ana...
Michael Lindenbaum
KR
2010
Springer
14 years 10 days ago
Towards a Logic of Feature-Based Semantic Science Theories
The aim of semantic science is to allow for the publications of ontologies, observation data, and hypotheses/theories. Hypotheses make predictions on data and on new cases. Those ...
David Poole
CHI
2011
ACM
12 years 11 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
IPOM
2009
Springer
14 years 2 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy