Sciweavers

1573 search results - page 131 / 315
» Strong User Authentication
Sort
View
ICDAR
2003
IEEE
15 years 7 months ago
A Flexible Recognition Engine for Complex On-line Handwritten Character Recognition
A major feature of new mobiles terminals using penbased interfaces, such as personal assistants or e-book, is their personal character, implying that a good interface should be ea...
Sanparith Marukatat, Rudy Sicard, Thierry Arti&egr...
103
Voted
CORR
2008
Springer
87views Education» more  CORR 2008»
15 years 1 months ago
Visualization of association graphs for assisting the interpretation of classifications
Given a query on the PASCAL database maintained by the INIST, we design user interfaces to visualize and wo types of graphs extracted from abstracts: 1) the graph of all associati...
Eric SanJuan, Ivana Roche
CCS
2005
ACM
15 years 7 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
78
Voted
ICIP
1998
IEEE
16 years 3 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
WWW
2006
ACM
16 years 2 months ago
Towards content trust of web resources
Trust is an integral part of the Semantic Web architecture. Most prior work on trust focuses on entity-centered issues such as authentication and reputation and does not take into...
Yolanda Gil, Donovan Artz