Sciweavers

158 search results - page 6 / 32
» Cognitive security for personal devices
Sort
View
86
Voted
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
SOUPS
2010
ACM
15 years 1 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
14 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
TEI
2010
ACM
121views Hardware» more  TEI 2010»
15 years 4 months ago
Myglobe: a navigation service based on cognitive maps
Myglobe is a user generated navigation service that enables users to share each cognitive map with one another. Cognitive map is a personalized map, shape of which is emphasized a...
Takuo Imbe, Fumitaka Ozaki, Shin Kiyasu, Yusuke Mi...
ICMCS
2007
IEEE
208views Multimedia» more  ICMCS 2007»
15 years 1 months ago
A Cognitive and Unsupervised Map Adaptation Approach to the Recognition of the Focus of Attention from Head Pose
In this paper, the recognition of the visual focus of attention (VFOA) of meeting participants (as defined by their eye gaze direction) from their head pose is addressed. To this ...
Jean-Marc Odobez, Sileye O. Ba