Results 1 - 10
of
8,954
Cognitive security for personal devices
- In The First ACM Workshop on AISec
, 2008
"... Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds—for example, computers authenticate users by challenging them to repeat a secret rather than by continually observing ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
the many subtle cues offered by their appearance and behavior. We propose two lines of research that can be combined to produce cognitive security on computers and other personal devices: continuously deployed multi-modal biometrics and adjustably autonomous security.
Biometric authentication for mobile personal device
- In First International Workshop on Personalized Networks
, 2006
"... Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-auth ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
, 1999
"... In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate ..."
Abstract
-
Cited by 601 (13 self)
- Add to MetaCart
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate
MACAW: A Media Access Protocol for Wireless LAN's
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract
-
Cited by 839 (11 self)
- Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.
SEMOPS: PAYING WITH MOBILE PERSONAL DEVICES
"... The growth of mobile commerce is directly related to the increase of ownership and use of mobile personal, programmable communication devices, including mobile phones and PDAs. These devices provide effective authorisation and management of payment and banking transactions since they are capable of ..."
Abstract
- Add to MetaCart
The growth of mobile commerce is directly related to the increase of ownership and use of mobile personal, programmable communication devices, including mobile phones and PDAs. These devices provide effective authorisation and management of payment and banking transactions since they are capable
A New Location Technique for the Active Office
, 1997
"... Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who or ..."
Abstract
-
Cited by 515 (4 self)
- Add to MetaCart
or what was around them. By determining their context, using input from sensor systems distributed throughout the environment, computing devices could personalize themselves to their current user, adapt their behavior according to their location, or react to their surroundings. The authors present a
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
motivated work behavior to develop; (b) the characteristics of jobs that can create these psychological states; and (c) the attributes of individuals that determine how positively a person will respond to a complex and challenging job. The model was tested for 658 employees who work on 62 different jobs
SBone: Personal Device Sharing Using Social Networks
, 2010
"... People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone, an a ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone
User-relative names for globally connected personal devices
- in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS06
, 2006
"... Nontechnical users who own increasingly ubiquitous networkenabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
Nontechnical users who own increasingly ubiquitous networkenabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer
Results 1 - 10
of
8,954