• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,954
Next 10 →

Cognitive security for personal devices

by Rachel Greenstadt, Jacob Beal - In The First ACM Workshop on AISec , 2008
"... Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds—for example, computers authenticate users by challenging them to repeat a secret rather than by continually observing ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
the many subtle cues offered by their appearance and behavior. We propose two lines of research that can be combined to produce cognitive security on computers and other personal devices: continuously deployed multi-modal biometrics and adjustably autonomous security.

Biometric authentication for mobile personal device

by Qian Tao, Raymond N. J. Veldhuis - In First International Workshop on Personalized Networks , 2006
"... Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-auth ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks

by Frank Stajano, Ross Anderson , 1999
"... In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate ..."
Abstract - Cited by 601 (13 self) - Add to MetaCart
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate

MACAW: A Media Access Protocol for Wireless LAN's

by Vaduvur Bharghavan, et al.
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract - Cited by 839 (11 self) - Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.

SEMOPS: PAYING WITH MOBILE PERSONAL DEVICES

by Venetakis A
"... The growth of mobile commerce is directly related to the increase of ownership and use of mobile personal, programmable communication devices, including mobile phones and PDAs. These devices provide effective authorisation and management of payment and banking transactions since they are capable of ..."
Abstract - Add to MetaCart
The growth of mobile commerce is directly related to the increase of ownership and use of mobile personal, programmable communication devices, including mobile phones and PDAs. These devices provide effective authorisation and management of payment and banking transactions since they are capable

A New Location Technique for the Active Office

by Andy Ward, Alan Jones , 1997
"... Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who or ..."
Abstract - Cited by 515 (4 self) - Add to MetaCart
or what was around them. By determining their context, using input from sensor systems distributed throughout the environment, computing devices could personalize themselves to their current user, adapt their behavior according to their location, or react to their surroundings. The authors present a

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
motivated work behavior to develop; (b) the characteristics of jobs that can create these psychological states; and (c) the attributes of individuals that determine how positively a person will respond to a complex and challenging job. The model was tested for 658 employees who work on 62 different jobs

SBone: Personal Device Sharing Using Social Networks

by Pravin Shankar, Badri Nath, Liviu Iftode, Vancheswaran Ananthanarayanan, Lu Han , 2010
"... People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone, an a ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone

User-relative names for globally connected personal devices

by Bryan Ford, Jacob Strauss, Chris Lesniewski-laas, Sean Rhea, Frans Kaashoek, Robert Morris - in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS06 , 2006
"... Nontechnical users who own increasingly ubiquitous networkenabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
Nontechnical users who own increasingly ubiquitous networkenabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer
Next 10 →
Results 1 - 10 of 8,954
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University