- Full text PDF available (1)
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to <i>observe</i> user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication systems that are resilient to observation attacks. Our proposal is the first to rely on the human… (More)
This research aims to develop a new methodology and its supporting technologies for learning about computation and programming in the introductory stage through a hands-on playing experience with toys. This allows a beginner to acquire the concepts and knowledge of computation and programming by playing with a model railway set.