Sciweavers

293 search results - page 8 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
CHI
2010
ACM
14 years 2 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
ICCAL
1989
13 years 11 months ago
Signal Constellation Design Tool: A Case Study in User Interface Synthesis
Signal constellation design is a major subtask of constructing an efficient communication system; it essentially entails trading-off error frequency against information throughput...
Gabriel Robins
AIME
2001
Springer
14 years 1 days ago
A User Interface for Executing Asbru Plans
Asbru is a language for specifying treatment plans. These plans are then used by an execution unit to give advice to the medical staff what actions to take (open-loop system). In ...
Robert Kosara, Silvia Miksch
ICISS
2007
Springer
13 years 11 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
EICS
2009
ACM
14 years 2 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier