Sciweavers

293 search results - page 4 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
NOMS
2010
IEEE
163views Communications» more  NOMS 2010»
13 years 6 months ago
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray...
TNC
2004
146views Education» more  TNC 2004»
13 years 9 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
ISN
1998
Springer
140views Communications» more  ISN 1998»
13 years 11 months ago
Adaptable and Adaptive User Interfaces for Disabled Users in the AVANTI Project
This paper reports work carried out in the context of the ACTS AVANTI AC042 project, addressing the issue of providing accessibility and high quality interaction in Web-based multi...
Constantine Stephanidis, Alex Paramythis, Michael ...
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
13 years 9 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
13 years 11 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy