Sciweavers

1460 search results - page 209 / 292
» Meeting people where they are
Sort
View
CCS
2007
ACM
15 years 6 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
DRM
2007
Springer
15 years 6 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
ISVC
2007
Springer
15 years 6 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 5 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
HRI
2006
ACM
15 years 5 months ago
Encouraging physical therapy compliance with a hands-Off mobile robot
This paper presents results toward our ongoing research program into hands-off assistive human-robot interaction [6]. Our work has focused on applications of socially assistive r...
Rachel Gockley, Maja J. Mataric