Sciweavers

1573 search results - page 104 / 315
» Strong User Authentication
Sort
View
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
INTERACT
2003
14 years 11 months ago
Be Quiet? Evaluating Proactive and Reactive User Interface Assistants
: This research examined the ability of an anthropomorphic interface assistant to help people learn and use an unfamiliar text-editing tool, with a specific focus on assessing proa...
Jun Xiao, Richard Catrambone, John T. Stasko
GLOBECOM
2010
IEEE
14 years 8 months ago
Enabling Secondary Access through Robust Primary User Channel Assignment
Abstract--A common concept to mitigate the effects of spectrum scarcity is to allow opportunistic dynamic spectrum access (DSA) to licensed frequency bands. In this context, the li...
Jad Nasreddine, Andreas Achtzehn, Janne Riihij&aum...
ICCS
2004
Springer
15 years 3 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 1 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig