Sciweavers

2648 search results - page 109 / 530
» Human Factors In Computer Security
Sort
View
CHI
2003
ACM
16 years 5 months ago
Safe & sound: a wireless leash
Safe & Sound uses location-aware mobile phones to create a "virtual leash"; a secure zone beyond which a child may not travel. If the child leaves this zone, both ch...
Natalia Marmasse, Chris Schmandt
ACMDIS
2008
ACM
15 years 7 months ago
Subjective objectivity: negotiating emotional meaning
Affective computing systems face challenges in relating objective measures with subjective human experiences. Many systems have either focused on objective measures as a substitut...
Lucian Leahu, Steve Schwenk, Phoebe Sengers
OZCHI
2006
ACM
15 years 11 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
EUROCRYPT
2005
Springer
15 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
CHI
2006
ACM
16 years 5 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst