Sciweavers

20 search results - page 4 / 4
» On User Choice in Graphical Password Schemes
Sort
View
SPW
2004
Springer
13 years 10 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
IJISMD
2010
135views more  IJISMD 2010»
13 years 2 months ago
On the Usage of Labels and Icons in Business Process Modeling
The value of business process models is dependent not only on the choice of graphical elements in the model, but also on their annotation with additional textual and graphical inf...
Jan Mendling, Jan Recker, Hajo A. Reijers
CHI
2008
ACM
14 years 5 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
VIS
2004
IEEE
116views Visualization» more  VIS 2004»
14 years 6 months ago
Interactive Design of Multi-Perspective Images for Visualizing Urban Landscapes
Multi-perspective images are a useful way to visualize extended, roughly planar scenes such as landscapes or city blocks. However, constructing effective multi-perspective images ...
Augusto Román, Gaurav Garg, Marc Levoy
BMCBI
2005
163views more  BMCBI 2005»
13 years 5 months ago
CoaSim: A flexible environment for simulating genetic data under coalescent models
Background: Coalescent simulations are playing a large role in interpreting large scale intraspecific sequence or polymorphism surveys and for planning and evaluating association ...
Thomas Mailund, Mikkel H. Schierup, Christian N. S...