Sciweavers

2399 search results - page 128 / 480
» On Authentication between Human and Computer
Sort
View
ITICSE
2003
ACM
15 years 9 months ago
The evaluation of electronic marking of examinations
This paper discusses an approach to the electronic (automatic) marking of examination papers, in particular, the extent to which it is possible to mark a candidate’s answers aut...
Pete Thomas
WWW
2005
ACM
16 years 4 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
HCI
2011
14 years 7 months ago
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues
We studied communication patterns in face-to-face dialogues between people for the purpose of identifying conversation features that can be exploited to improve human-computer inte...
Masashi Inoue, Toshio Irino, Nobuhiro Furuyama, Ry...
ICNP
2006
IEEE
15 years 10 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
CCS
2008
ACM
15 years 6 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig