Sciweavers

1573 search results - page 180 / 315
» Strong User Authentication
Sort
View
120
Voted
ISW
2010
Springer
14 years 11 months ago
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the p...
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, H...
WIKIS
2010
ACM
14 years 11 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
125
Voted
VR
2008
IEEE
169views Virtual Reality» more  VR 2008»
15 years 8 months ago
Conversational Pointing Gestures for Virtual Reality Interaction: Implications from an Empirical Study
Interaction in conversational interfaces strongly relies on the system’s capability to interpret the user’s references to objects via deictic expressions. Deictic gestures, es...
Thies Pfeiffer, Marc Erich Latoschik, Ipke Wachsmu...
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Internet of Things - Context-based Device Federations
Locating physical devices and accessing their functionality in pervasive environments is strongly restricted by their locality. Since there are more and more devices available, wa...
Andreas Heil, Mirko Knoll, Torben Weis
IV
2007
IEEE
146views Visualization» more  IV 2007»
15 years 8 months ago
Web Based Visual Exploration of Patent Information
Patents are an invaluable source of scientific and technological information. Due to the strongly increasing number of patent applications and the broadening of the objectives of...
Mark Giereth, Steffen Koch, Martin Rotard, Thomas ...