Learn More
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to <i>observe</i> user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication systems that are resilient to observation attacks. Our proposal is the first to rely on the human(More)
Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On(More)
Passwords are the most common authentication scheme today. However, it is difficult for people to memorize strong passwords, such as random sequences of characters. Additionally, passwords do not provide protection against phishing attacks. This paper introduces WebTicket, a low cost, easy-to-use and reliable web account management system that uses(More)
We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form of active authentication (e.g., typing a PIN) based on the combination of multiple passive factors (e.g., a user's current location) for authentication. We provide a probabilistic framework(More)
Fruits and vegetables are rich sources of antioxidants in human diets and their intake is associated with chronic disease prevention. Lettuce (Lactuca sativa L.) is a common vegetable in diets worldwide, but its nutritional content is relatively low. To elucidate the genetic basis of antioxidant content in lettuce, we measured the oxygen radical absorbance(More)
We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to combine a number of passive factors for authentication (e.g., a user's current location) with appropriate active factors. In this paper, we provide a probabilistic framework for dynamically selecting an active(More)
In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version of a previously seen image. We illustrate how distorted images can be used to maintain the usability of(More)
Time is a difficult concept for parents to communicate with young children. We developed TimeBlocks, a novel tangible, playful object to facilitate communication about concepts of time with young children. TimeBlocks consists of a set of cubic blocks that function as a physical progress bar. Parents and children can physically manipulate the blocks to(More)
  • Jean-Étienne Morlighem, Shintaro Aoki, Mami Kishima, Mitsue Hanami, Chihiro Ogawa, Amadu Jalloh +23 others
  • 2011
BACKGROUND Pandemic influenza A(H1N1) virus infection quickly circulated worldwide in 2009. In Japan, the first case was reported in May 2009, one month after its outbreak in Mexico. Thereafter, A(H1N1) infection spread widely throughout the country. It is of great importance to profile and understand the situation regarding viral mutations and their(More)