Sciweavers

1573 search results - page 146 / 315
» Strong User Authentication
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 12 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
WWW
2009
ACM
16 years 2 months ago
Community gravity: measuring bidirectional effects by trust and rating on online social networks
Several attempts have been made to analyze customer behavior on online E-commerce sites. Some studies particularly emphasize the social networks of customers. Users' reviews ...
Yutaka Matsuo, Hikaru Yamamoto
ICCV
1999
IEEE
16 years 3 months ago
Manhattan World: Compass Direction from a Single Image by Bayesian Inference
When designing computer vision systems for the blind and visually impaired it is important to determine the orientation of the user relative to the scene. We observe that most ind...
James M. Coughlan, Alan L. Yuille
IJACT
2008
64views more  IJACT 2008»
15 years 1 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
CCS
2007
ACM
15 years 8 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...