Sciweavers

2399 search results - page 14 / 480
» On Authentication between Human and Computer
Sort
View
ITS
2010
Springer
167views Multimedia» more  ITS 2010»
15 years 2 months ago
Investigating the Relationship between Presence and Learning in a Serious Game
We investigate the role of presence in a serious game for intercultural communication and negotiation skills by comparing two interfaces: a 3D version with animated virtual humans ...
H. Chad Lane, Matthew J. Hays, Daniel Auerbach, Ma...
84
Voted
CHI
2009
ACM
15 years 10 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
CCS
2008
ACM
14 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ICDCSW
2002
IEEE
15 years 2 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
66
Voted
ACSAC
2009
IEEE
15 years 4 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...