Sciweavers

71 search results - page 2 / 15
» Hiding HSM Systems from the User
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 7 days ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
BPM
2010
Springer
147views Business» more  BPM 2010»
13 years 3 months ago
From People to Services to UI: Distributed Orchestration of User Interfaces
Traditionally, workflow management systems aim at alleviating people's burden of coordinating repetitive business procedures, i.e., they coordinate people. Web service orchest...
Florian Daniel, Stefano Soi, Stefano Tranquillini,...
TDSC
2011
13 years 22 days ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
TABLETOP
2006
IEEE
13 years 11 months ago
Transparent Tabletop Interface for Multiple Users on Lumisight Table
This paper presents a new type of tabletop interface on Lumisight Table. Putting physical objects on a tabletop display is one of the typical methods for intuitive tangible input....
Yasuaki Kakehi, Takero Hosomi, Makoto Iida, Takesh...
IADIS
2003
13 years 7 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...