Sciweavers

632 search results - page 68 / 127
» Two Facets of Authentication
Sort
View
PVLDB
2010
66views more  PVLDB 2010»
13 years 7 months ago
Seaform: Search-As-You-Type in Forms
Form-style interfaces have been widely used to allow users to access information. In this demonstration paper, we develop a new search paradigm in form-style query interfaces, cal...
Hao Wu, Guoliang Li, Chen Li, Lizhu Zhou
IEEEVAST
2010
13 years 3 months ago
Click2Annotate: Automated Insight Externalization with rich semantics
Insight Externalization (IE) refers to the process of capturing and recording the semantics of insights in decision making and problem solving. To reduce human effort, Automated I...
Yang Chen, Scott Barlowe, Jing Yang
FC
2004
Springer
94views Cryptology» more  FC 2004»
14 years 2 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
IEEEARES
2008
IEEE
14 years 3 months ago
Modelling Security Properties in a Grid-based Operating System with Anti-Goals
In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar