Sciweavers

411 search results - page 45 / 83
» User Authentication in Multidatabase Systems
Sort
View
CHI
2010
ACM
14 years 3 months ago
Usability and strength in click-based graphical passwords
Click-based graphical passwords have attractive usability properties, such as cueing and good memorability. However, image size and number of click-points in each password signifi...
Elizabeth Stobert
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
14 years 3 months ago
Harmonizing service and network provisioning for federative access in a mobile environment
—In this paper we propose an integrated platform to power the symbiosis between networks and services whilst supporting mobility of users. This platform is based on methods for a...
David J. Lutz, Patrick Mandic, Sascha Neinert, Rut...
ISICT
2003
13 years 10 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
SOUPS
2009
ACM
14 years 3 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
ACSAC
2004
IEEE
14 years 18 days ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...