Sciweavers

2399 search results - page 4 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2009
ACM
15 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
WIS
2004
14 years 11 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
VL
1996
IEEE
120views Visual Languages» more  VL 1996»
15 years 1 months ago
Visual Language Features Supporting Human-Human and Human-Computer Communication
Fundamental to the design of visual languages are the goals of facilitating communication between people and computers, and between people and other people. The Object Block Progr...
Jason E. Robbins, David J. Morley, David F. Redmil...
ECTEL
2010
Springer
14 years 10 months ago
Content, Social, and Metacognitive Statements: An Empirical Study Comparing Human-Human and Human-Computer Tutorial Dialogue
Abstract. We present a study which compares human-human computermediated tutoring with two computer tutoring systems based on the same materials but differing in the type of feedba...
Myroslava Dzikovska, Natalie B. Steinhauser, Johan...
JCS
2011
126views more  JCS 2011»
14 years 4 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe