Sciweavers

61 search results - page 2 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
CHI
2007
ACM
14 years 5 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 2 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
ACMDIS
2008
ACM
13 years 7 months ago
Handy navigation in ever-changing spaces: an ethnographic study of firefighting practices
This paper presents an ethnographic study, conducted to gain an insight of the practices around navigation of firefighters on the first line of intervention. We argue that the com...
Sebastian Denef, Leonardo Ramirez, Tobias Dyrks, G...
PERCOM
2007
ACM
14 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
LISA
2000
13 years 6 months ago
Pelendur: Steward of the Sysadmin
Here we describe Pelendur, a system for the management of common system operation tasks. Specifically, Pelendur focuses on the management of user accounts and related information ...
Matt Curtin, Sandy Farrar, Tami King