-
3
-
-
27644505463
-
The untrusted computer problem and camera-based authentication
-
D. E. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. L. Rivest. The untrusted computer problem and camera-based authentication. In Proc. of the Pervasive Computing, 2002.
-
(2002)
Proc. of the Pervasive Computing
-
-
Clarke, D.E.1
Gassend, B.2
Kotwal, T.3
Burnside, M.4
Van Dijk, M.5
Devadas, S.6
Rivest, R.L.7
-
4
-
-
39049162527
-
Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy
-
D. Florencio and C. Herley. Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy. In Proc. of the ACSAC, 2006.
-
(2006)
Proc. of the ACSAC
-
-
Florencio, D.1
Herley, C.2
-
5
-
-
70450171759
-
Trustworthy and personalized computing on public kiosks
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Trustworthy and personalized computing on public kiosks. In Proc. of the MobiSys, 2008.
-
(2008)
Proc. of the MobiSys
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
6
-
-
39049092821
-
Delegate: A proxy based architecture for secure website access from an untrusted machine
-
R. C. Jammalamadaka, T. W. van der Horst, S. Mehrotra, K. E. Seamons, and N. Venkasubramanian. Delegate: A proxy based architecture for secure website access from an untrusted machine. In Proc. of the ACSAC, 2006.
-
(2006)
Proc. of the ACSAC
-
-
Jammalamadaka, R.C.1
Van Der Horst, T.W.2
Mehrotra, S.3
Seamons, K.E.4
Venkasubramanian, N.5
-
7
-
-
79955991908
-
Using a personal device to strengthen password authentication from an untrusted computer
-
M. Mannan and P. C. van Oorschot. Using a personal device to strengthen password authentication from an untrusted computer. In Proc. of the Financial Cryptography, 2007.
-
(2007)
Proc. of the Financial Cryptography
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
8
-
-
38549114809
-
Guardian: A framework for privacy control in untrusted environments
-
University of Massachusetts, Amherst
-
N. B. Margolin, M. Wright, and B. N. Levine. Guardian: A framework for privacy control in untrusted environments. Technical Report, University of Massachusetts, Amherst, 2004.
-
(2004)
Technical Report
-
-
Margolin, N.B.1
Wright, M.2
Levine, B.N.3
-
12
-
-
0007968045
-
Virtual network computing
-
T. Richardson, Q. Stafford-FraserK. R. Wood, and A. Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33-38, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
13
-
-
0036785515
-
A composable framework for secure multi-modal access to internet services from post-pc devices
-
S. J. Ross, J. L. Hill, M. Y. Chen, A. D. Joseph, D. E. Culler, and E. A. Brewer. A composable framework for secure multi-modal access to internet services from post-pc devices. Mob. Netw. Appl., 7(5):389-406, 2002.
-
(2002)
Mob. Netw. Appl.
, vol.7
, Issue.5
, pp. 389-406
-
-
Ross, S.J.1
Hill, J.L.2
Chen, M.Y.3
Joseph, A.D.4
Culler, D.E.5
Brewer, E.A.6
-
16
-
-
0141502168
-
The personal server: Changing the way we think about ubiquitous computing
-
R. Want, T. Pering, G. Danneels, M. Kumar, M. Sundar, and J. Light. The personal server: Changing the way we think about ubiquitous computing. In Proc. of the Ubicomp, 2002.
-
(2002)
Proc. of the Ubicomp
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
Light, J.6
-
18
-
-
70450190417
-
-
https://developer.mozilla.org/en/Extensions.
-
-
-
-
19
-
-
70450185376
-
-
http://msdn.microsoft.com/en-us/library/aa753587(VS.85).aspx.
-
-
-
-
20
-
-
70450174755
-
-
(programming)
-
http://en.wikipedia.org/wiki/Ajax (programming).
-
-
-
-
21
-
-
70450204223
-
-
http://en.wikipedia.org/wiki/Likertscale.
-
-
-
-
23
-
-
70450160423
-
-
Fennec. https://wiki.mozilla.org/Fennec.
-
Fennec
-
-
|