Sciweavers

130 search results - page 13 / 26
» User Authentication through Typing Biometrics Features
Sort
View
HICSS
2009
IEEE
115views Biometrics» more  HICSS 2009»
14 years 2 months ago
Effects of Adaptivity and Other External Variables on Mobile Service Adoption
User Interface between user and information systems has a great role in system adoption. Based on technology acceptance model, acceptance of a system is explained as a function of...
Ebru Polat, Nuri Basoglu, Tugrul U. Daim
IEEEIAS
2008
IEEE
14 years 1 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IMC
2009
ACM
14 years 2 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
HPDC
2002
IEEE
14 years 13 days ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
WMASH
2005
ACM
14 years 1 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina