Sciweavers

1573 search results - page 130 / 315
» Strong User Authentication
Sort
View
95
Voted
ROBOTICA
2002
72views more  ROBOTICA 2002»
15 years 1 months ago
The Weston wheelchair mounted assistive robot - the design story
Robotic technology can be used in several ways to benefit people with disabilities. This paper describes the mounting of a robotic arm to a powered wheelchair to assist disabled u...
Michael Hillman, Karen Hagan, Sean Hagan, Jill Jep...
WWW
2005
ACM
16 years 2 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
SIGUCCS
2003
ACM
15 years 7 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
IADIS
2004
15 years 3 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 8 months ago
It's Doomed; We Can Prove It
Abstract. Programming errors found early are the cheapest. Tools applying to the early stage of code development exist but either they suffer from false positives (“noise”) or...
Jochen Hoenicke, K. Rustan M. Leino, Andreas Podel...