Sciweavers

247 search results - page 6 / 50
» Session-Key Generation Using Human Passwords Only
Sort
View
69
Voted
MHCI
2009
Springer
15 years 4 months ago
The use of mobile contact list applications and a context-oriented framework to support their design
Contact lists are one of the most frequently used applications on mobile devices. They are used not only as contact detail repositories, but also as temporary information storage ...
Andreas Komninos, Dimitrios Liarokapis
ASIACRYPT
2005
Springer
15 years 3 months ago
A Practical Attack on the Fixed RC4 in the WEP Mode
In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also kno...
Itsik Mantin
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
OZCHI
2006
ACM
15 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
GI
2004
Springer
15 years 2 months ago
Towards Using the Full Human Potential in Games and Virtual Environments
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
Steffi Beckhaus