Sciweavers

2399 search results - page 32 / 480
» On Authentication between Human and Computer
Sort
View
NDSS
2002
IEEE
15 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
EUROCRYPT
2005
Springer
15 years 3 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
CVPR
2010
IEEE
15 years 6 months ago
Modeling Mutual Context of Object and Human Pose in Human-Object Interaction Activities
Detecting objects in cluttered scenes and estimating articulated human body parts are two challenging problems in computer vision. The difficulty is particularly pronounced in ac...
Bangpeng Yao, Li Fei-Fei
CHI
2010
ACM
15 years 3 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
ATAL
2011
Springer
13 years 9 months ago
The effect of expression of anger and happiness in computer agents on negotiations with humans
There is now considerable evidence in social psychology, economics, and related disciplines that emotion plays an important role in negotiation. For example, humans make greater c...
Celso M. de Melo, Peter Carnevale, Jonathan Gratch