Sciweavers

1018 search results - page 18 / 204
» Remote User Authentication Using Public Information
Sort
View
UIST
2003
ACM
15 years 5 months ago
Dynamo: a public interactive surface supporting the cooperative sharing and exchange of media
In this paper we propose a novel way of supporting occasional meetings that take place in unfamiliar public places, which promotes lightweight, visible and fluid collaboration. Ou...
Shahram Izadi, Harry Brignull, Tom Rodden, Yvonne ...
95
Voted
IEEECIT
2010
IEEE
14 years 10 months ago
Enabling Use of Single Password over Multiple Servers in Two-Server Model
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Yanjiang Yang, Feng Bao
AVI
2006
15 years 1 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou
WWW
2009
ACM
16 years 11 days ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 9 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel