Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
—Many recognition procedures rely on the consistency of a subset of data features with a hypothesis as the sufficient evidence to the presence of the corresponding object. We ana...
The aim of semantic science is to allow for the publications of ontologies, observation data, and hypotheses/theories. Hypotheses make predictions on data and on new cases. Those ...
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...