Sciweavers

12289 search results - page 2129 / 2458
» computing 2006
Sort
View
SOUPS
2006
ACM
15 years 10 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
SOUPS
2006
ACM
15 years 10 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
STOC
2006
ACM
112views Algorithms» more  STOC 2006»
15 years 10 months ago
Limitations of quantum coset states for graph isomorphism
It has been known for some time that graph isomorphism reduces to the hidden subgroup problem (HSP). What is more, most exponential speedups in quantum computation are obtained by...
Sean Hallgren, Cristopher Moore, Martin Rötte...
UIST
2006
ACM
15 years 10 months ago
Personalizing routes
Navigation services (e.g., in-car navigation systems and online mapping sites) compute routes between two locations to help users navigate. However, these routes may direct users ...
Kayur Patel, Mike Y. Chen, Ian E. Smith, James A. ...
UIST
2006
ACM
15 years 10 months ago
Pen-top feedback for paper-based interfaces
Current paper-based interfaces such as PapierCraft, provide very little feedback and this limits the scope of possible interactions. So far, there has been little systematic explo...
Chunyuan Liao, François Guimbretière...
« Prev « First page 2129 / 2458 Last » Next »