Sciweavers

274 search results - page 38 / 55
» Security user studies: methodologies and best practices
Sort
View
ETRA
2008
ACM
130views Biometrics» more  ETRA 2008»
14 years 11 months ago
Longitudinal evaluation of discrete consecutive gaze gestures for text entry
Eye-typing performance results are reported from controlled studies comparing an on-screen keyboard and EyeWrite, a new on-screen gestural input alternative. Results from the firs...
Jacob O. Wobbrock, James Rubinstein, Michael W. Sa...
ICDE
2008
IEEE
113views Database» more  ICDE 2008»
15 years 4 months ago
A rank-rewrite framework for summarizing XML documents
Abstract— With XML becoming a standard for data representation and exchange, we can expect to see large scale repositories and warehouses of XML data. In order for users to under...
Maya Ramanath, Kondreddi Sarath Kumar
IACR
2011
137views more  IACR 2011»
13 years 9 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
SOUPS
2006
ACM
15 years 3 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
WWW
2009
ACM
15 years 10 months ago
How much can behavioral targeting help online advertising?
Behavioral Targeting (BT) is a technique used by online advertisers to increase the effectiveness of their campaigns, and is playing an increasingly important role in the online a...
Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang...