Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
The main problem with user authentication on the Web is that many sites are used infrequently and people forget their passwords over time. Another problem is that the ...
Unlike high fidelity prototypes which are very detailed and may look very much like the final interface, low fidelity or ``low-fi'' prototypes are a rough rendition of the interface that presents only ...
After the portfolio selection phase, we use a short training phase to improve the memorability of the portfolio images. During training, the user points out the pictures in her portfolio from a ...
Déjà Vu is easier than it looks: Although some users remarked that they would never be able to remember the portfolios they created, all were surprised that they could recognize their images and at ...
The total delay incurred by a data frame from an AP in the absence of handshake is given by: the contention and transmission delay of the data frame plus the respective delay.
It took longer for users to create image portfolios than to create passwords and PINS. Photo portfolios took longer to create than Random Art portfolios, because people spent more time browsing and ...
A trusted server stores all portfolio images for each user. Since each image is derived directly from the seed, the server only needs to store the seed and not the entire image. In our prototype ...
We describe two applications for which Déjà Vu is well suited and would improve security.
In order to estimate the downstream bandwidth from the access point to an end-host, we propose a methodology that allows the end-host to estimate the delays of the periodic Beacon frames sent from an ...
Current secure systems suffer because they neglect the importance of human factors in security. We address a fundamental weakness of knowledge-based authentication schemes, which is the human ...