Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by recording the individual’s authentication session. This is referred to as shoulder-surfing and is a known risk, of special concern when authenticating in public places. Until […]
Mobile Computing, Smartphones,and Existing Computer Science
Personal mobile devices like the iPhone, Android Phone or Windows Phone 7, are becoming increasingly ubiquitous. These devices are packed with interesting sensors, input devices, and computing power. The development environments for these devices are freely available and have matured with well integrated tools and libraries for building applications. Most importantly, all major device vendors […]
The Journal of Computing Sciences -conference proceedings-free
Papers of the Fifteenth Annual CCSC Northeastern Conference April 16-17, 2010 University of Hartford DEVELOPING COMPETITIVE PROJECT PROPOSALS FOR NSF — PRECONFERENCE WORKSHOP 14 Scott Grissom, National Science Foundation HOW RUBRICS THAT MEASURE OUTCOMES CAN COMPLETE THE ASSESSMENT LOOP . 15 Frances Bailie, Iona College, Bill Marion, Valparaiso University, Deborah Whitfield, Slippery Rock University ASSESSING […]