Sciweavers

1573 search results - page 123 / 315
» Strong User Authentication
Sort
View
IWC
2000
82views more  IWC 2000»
15 years 1 months ago
What is beautiful is usable
An experiment was conducted to test the relationships between users' perceptions of a computerized system's beauty and usability. The experiment used a computerized appl...
Noam Tractinsky, A. S. Katz, D. Ikar
SIGSOFT
2004
ACM
16 years 2 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
93
Voted
SOUPS
2009
ACM
15 years 8 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
96
Voted
NDSS
2008
IEEE
15 years 8 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 8 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...