Sciweavers

5273 search results - page 107 / 1055
» Secured Web Access
Sort
View
117
Voted
W4A
2009
ACM
15 years 8 months ago
Accessibility perspectives on enabling South African sign language in the South African national accessibility portal
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 5 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
ESORICS
2008
Springer
15 years 3 months ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
IWC
2006
98views more  IWC 2006»
15 years 1 months ago
Flexible tool support for accessibility evaluation
The increasing need to check Web site accessibility has stimulated interest in tools to aid the various activities involved. While some tools for this purpose already exist, we be...
Barbara Leporini, Fabio Paternò, Antonio Sc...
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin