Sciweavers

1018 search results - page 38 / 204
» Remote User Authentication Using Public Information
Sort
View
CSE
2009
IEEE
15 years 7 months ago
Using Qtag to Extract Dominant Public Opinion in Very Large-Scale Conversation
— These days VLSC (Very Large-Scale Conversation) is a particular type of online conversation, that is large scale, public, text-based, many-to-many and persistent. The nature of...
Sung Eob Lee, Taeksoo Chun, Steve SangKi Han
ETRA
2010
ACM
233views Biometrics» more  ETRA 2010»
15 years 11 months ago
Estimating cognitive load using remote eye tracking in a driving simulator
We report on the results of a study in which pairs of subjects were involved in spoken dialogues and one of the subjects also operated a simulated vehicle. We estimated the driver...
Oskar Palinko, Andrew L. Kun, Alexander Shyrokov, ...
INFOCOM
2005
IEEE
15 years 10 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 11 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SEMWEB
2005
Springer
15 years 10 months ago
The Personal Publication Reader
This application demonstrates how to provide personalized, syndicated views on distributed web data using Semantic Web technologies. The application comprises four steps: The infor...
Fabian Abel, Robert Baumgartner, Adrian Brooks, Ch...