Sciweavers

1399 search results - page 18 / 280
» A Pattern for Secure Graphical User Interface Systems
Sort
View
108
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
14 years 11 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
95
Voted
EICS
2009
ACM
15 years 6 months ago
A toolkit for peer-to-peer distributed user interfaces: concepts, implementation, and applications
In this paper we present a software toolkit for deploying peer-topeer distributed graphical user interfaces across four dimensions: multiple displays, multiple platforms, multiple...
Jérémie Melchior, Donatien Grolaux, ...
TOG
2002
123views more  TOG 2002»
14 years 11 months ago
A user interface for interactive cinematic shadow design
Placing shadows is difficult task since shadows depend on the relative positions of lights and objects in an unintuitive manner. To simplify the task of the modeler, we present a ...
Fabio Pellacini, Parag Tole, Donald P. Greenberg
AVI
2006
15 years 1 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
CHI
2011
ACM
14 years 3 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin