Sciweavers

4511 search results - page 3 / 903
» Observation Based System Security
Sort
View
CHI
2009
ACM
14 years 17 days ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
ACSAC
2009
IEEE
14 years 17 days ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
DSN
2000
IEEE
13 years 10 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
JOCN
2011
117views more  JOCN 2011»
12 years 8 months ago
Identifying the What, Why, and How of an Observed Action: An fMRI Study of Mentalizing and Mechanizing during Action Observation
■ Humans commonly understand the unobservable mental states of others by observing their actions. Embodied simulation theories suggest that this ability may be based in areas of...
Robert P. Spunt, Ajay B. Satpute, Matthew D. Liebe...
CHI
2007
ACM
14 years 6 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...