Sciweavers

11612 search results - page 182 / 2323
» Human Computer Confluence
Sort
View
90
Voted
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 4 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
ETRICS
2006
15 years 2 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
ICPR
2004
IEEE
15 years 12 months ago
Exploring Human Eye Behaviour using a Model of Visual Attention
It is natural in a visual search to look at any object that is similar to the target so that it can be recognised and a decision made to end the search. Eye tracking technology of...
Fred Stentiford, Oyewole Oyekoya
SEMCO
2007
IEEE
15 years 5 months ago
Reliability of human annotation of semantic roles in noisy text
This paper addresses the question of how to obtain consistent semantic annotation on the basis of a set of noisy texts. Many potential realworld applications of semantic computing...
Derrick Higgins