Sciweavers

2399 search results - page 59 / 480
» On Authentication between Human and Computer
Sort
View
SEMCO
2008
IEEE
15 years 4 months ago
Mediatability: Estimating the Degree of Human Involvement in XML Schema Mediation
Mediation and integration of data are significant challenges because the number of services on the Web, and heterogeneities in their data representation, continue to increase rap...
Karthik Gomadam, Ajith Ranabahu, Lakshmish Ramaswa...
CHI
2009
ACM
15 years 10 months ago
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...
CHI
2007
ACM
15 years 10 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ECCV
2008
Springer
15 years 11 months ago
Multiple Tree Models for Occlusion and Spatial Constraints in Human Pose Estimation
Abstract. Tree-structured models have been widely used for human pose estimation, in either 2D or 3D. While such models allow efficient learning and inference, they fail to capture...
Greg Mori, Yang Wang 0003
PERCOM
2005
ACM
15 years 9 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...