Sciweavers

1573 search results - page 84 / 315
» Strong User Authentication
Sort
View
INTERSPEECH
2010
14 years 4 months ago
Lexical entrainment of real users in the let's go spoken dialog system
This paper examines the lexical entrainment of real users in the Let's Go spoken dialog system. First it presents a study of the presence of entrainment in a year of human-tr...
Gabriel Parent, Maxine Eskenazi
SOUPS
2010
ACM
15 years 1 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
ICCS
1997
Springer
15 years 2 months ago
Applying Conceptual Graph Theory to the User-Driven Specification of Network Information Systems
Users need to be strongly involved in the specification process of network information systems. Characteristics of user-driven specification are described, and process composition ...
Aldo de Moor
GI
2008
Springer
14 years 11 months ago
Utilization of Semantic Annotations in Interactive User Interfaces for Large Documents
Abstract: With new techniques, such as Microformats or RDFa, for integrating semantics into existing web formats, we expect a strong increase of semantically annotated documents in...
Mark Giereth, Michael Wörner, Harald Bosch, P...
ITICSE
2006
ACM
15 years 3 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci