Researchers have proposed systems in which users utilize an eye tracker to enter passwords by merely looking at the proper symbols on the computer monitor in the appropriate order. This authentication method is immune to the practice of shoulder surfing: secretly observing the keystrokes of a legitimate user as he or she types a password on a keyboard.
The majority of today’s authentication systems, including password and fingerprint scanners, are based on one-time, static authentication methods.
Tom Ravens and collaborators are developing process-based coastal erosion models. In contrast to conventional models, these models account for the thermal and mechanical processes that are important in the Arctic.
Search
  • CATEGORY

  • DISCIPLINE

  • ACADEMIC YEAR