Sciweavers

2399 search results - page 107 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2010
ACM
15 years 10 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
132
Voted
MHCI
2009
Springer
15 years 10 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
131
Voted
ICB
2007
Springer
184views Biometrics» more  ICB 2007»
15 years 10 months ago
Biometric Template Classification: A Case Study in Iris Textures
Most of the biometric authentication systems store multiple templates per user to account for variations in biometric data. Therefore, these systems suffer from storage space and ...
Edara Srinivasa Reddy, Chinnam SubbaRao, Inampudi ...
ADHOC
2007
109views more  ADHOC 2007»
15 years 4 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
HAPTICS
2009
IEEE
15 years 10 months ago
Effects of magnitude and phase cues on human motor adaptation
Recent findings have shown that humans can adapt their internal control model to account for the changing dynamics of systems they manipulate. In this paper, we explore the effect...
Ali Israr, Hakan Kapson, Volkan Patoglu, Marcia Ki...