Sciweavers

973 search results - page 41 / 195
» Personal Tele-Immersion Devices
Sort
View
82
Voted
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 3 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
90
Voted
MHCI
2004
Springer
15 years 3 months ago
Web Page Transformation When Switching Devices
With network and small screen device improvements, such as wireless abilities, increased memory and CPU speeds, users are no longer limited by location when accessing on-line infor...
Bonnie MacKay, Carolyn R. Watters, Jack Duffy
71
Voted
ISW
2005
Springer
15 years 3 months ago
Device-Enabled Authorization in the Grey-System
d Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania, USA We describe ...
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Mic...
90
Voted
MHCI
2005
Springer
15 years 3 months ago
Mystery in the museum: collaborative learning activities using handheld devices
In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a “Mystery in the M...
Jorge Simarro Cabrera, Henar Muñoz Frutos, ...
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...