Sciweavers

293 search results - page 16 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
NSDI
2008
13 years 10 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
IWQOS
2001
Springer
14 years 8 hour ago
Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing
To create acceptable levels of Quality of Service (QoS), designers need to be able to predict users’ behaviour in response to different levels of QoS. However, predicting behavio...
Anna Bouch, Martina Angela Sasse
HT
2005
ACM
14 years 1 months ago
Activity links: supporting communication and reflection about action
Tasks that take place over a long period of time or collaborative tasks where participants are required to develop an understanding of each other’s effort benefit from better co...
Hao-wei Hsieh, Frank M. Shipman III
CCS
2009
ACM
14 years 6 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
INFOCOM
2012
IEEE
11 years 10 months ago
SAP: Smart Access Point with seamless load balancing multiple interfaces
Abstract—Providing adequate Wi-Fi services to meet user demand in densely populated environments has been a fundamental challenge for Wi-Fi networks. In this paper, we explore th...
Xi Chen, Yue Zhao, Brian Peck, Daji Qiao