Sciweavers

1949 search results - page 135 / 390
» Protective Interface Specifications
Sort
View
CHI
2010
ACM
15 years 8 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter
105
Voted
CHI
2010
ACM
15 years 8 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
OZCHI
2005
ACM
15 years 7 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
VIZSEC
2005
Springer
15 years 7 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
ICCCN
1998
IEEE
15 years 6 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer