Sciweavers

2399 search results - page 23 / 480
» On Authentication between Human and Computer
Sort
View
CORR
2006
Springer
97views Education» more  CORR 2006»
14 years 9 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
77
Voted
PERCOM
2006
ACM
15 years 9 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
CSCW
2004
ACM
15 years 3 months ago
Hiding and revealing in online poker games
Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to t...
Scott A. Golder, Judith S. Donath
HCI
2009
14 years 7 months ago
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
This paper presents a new kind of interaction between users and a tabletop. The table described is interactive and associated with tangible and traceable objects using RFID technol...
Sébastien Kubicki, Sophie Lepreux, Yoann Le...
CHI
2008
ACM
15 years 10 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...