Sciweavers

2399 search results - page 101 / 480
» On Authentication between Human and Computer
Sort
View
CANDC
2002
ACM
15 years 3 months ago
Computer aided creativity: practical experience and theoretical concerns
In this paper I will outline some of the practical experiences and theoretical concerns that have informed some 15 years of research into the relationship between human creativity...
Robert Pepperell
SIGSOFT
2004
ACM
16 years 4 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
SOUPS
2009
ACM
15 years 10 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
XMLSEC
2003
ACM
15 years 9 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
CHI
2002
ACM
16 years 4 months ago
Towards time design: pacing of hypertext navigation by system response times
Two experiments investigated the effects of system response time (SRT) on hypertext navigation. Dependent variables were residence time, emotional strain and memory performance. A...
Herbert A. Meyer, Michael Hildebrandt