Sciweavers

1610 search results - page 32 / 322
» Identity Based Multisignatures
Sort
View
100
Voted
PERVASIVE
2009
Springer
15 years 8 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
76
Voted
ICCAD
1999
IEEE
79views Hardware» more  ICCAD 1999»
15 years 6 months ago
Improved interconnect sharing by identity operation insertion
This paper presents an approach to reduce interconnect cost by insertion of identity operations in a CDFG. Other than previous approaches, it is based on systematic pattern analys...
Dirk Herrmann, Rolf Ernst
HCI
2009
14 years 11 months ago
Social Practice: Becoming Enculturated in Human-Computer Interaction
Abstract. We present a new approach to the design, development and evaluation of embodied conversational agents (ECAs) that allows them to index identity through culturally and soc...
Justine Cassell
IEEEARES
2007
IEEE
15 years 8 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
DIM
2009
ACM
15 years 6 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad