544 research outputs found

    Quantifying the security advantage of password expiration policies

    Full text link

    The use of the 1 mm laparoscope to assist in port insertion in pelvic oncological surgery

    Get PDF
    BACKGROUND: A 1 mm minilaparoscope (Lifeline Biotechnoligies, Florida, USA) was assessed for aiding port site insertions. METHODS: Ten consecutive patients having laparoscopic procedures in a gynaecological oncology unit were included. Minilaparoscopy was feasible in all cases and was used to insert the umbilical port under direct vision in all patients. In one case, a thick band of abdominal adhesions was identified and a further lateral port site was inserted to aid their dissection. RESULTS: The minilaparoscope correctly identified all 10 patients with peritoneal disease and identified all patients who were suitable for debulking procedures. CONCLUSION: Minilaparoscopy with the 1 mm endoscope appears to be safe and accurate and we feel that it has a place in helping the surgeon identify adhesions and peritoneal disease as well as assisting further port site insertion safely and with minimal complications

    A second look at the usability of click-based graphical passwords

    Full text link
    Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-range of images, and gather information about the points selected by users; and a large-scale field study to examine how click-based graphical passwords work in practice. No such prior field studies have been reported in the literature. We found significant differences in the usability results of the two studies, providing empirical evidence that relying solely on lab studies for security interfaces can be problematic. We also present a first look at whether interference from having multiple graphical passwords affects usability and whether more memorable passwords are necessarily weaker in terms of security

    Influencing users towards better passwords: Persuasive cued click-points

    Get PDF
    Usable security has unique usability challenges because the need for security often means that standard human-computerinteraction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots ' portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more secure, click-points. Our approach is to introduce persuasion to the Cued Click-Points graphical password scheme (Chiasson, van Oorschot, Biddle, 2007). Our resulting scheme significantly reduces hotspots while still maintaining its usability

    Polynomial approximation of quasipolynomials based on digital filter design principles

    Get PDF
    This contribution is aimed at a possible procedure approximating quasipolynomials by polynomials. Quasipolynomials appear in linear time-delay systems description as a natural consequence of the use of the Laplace transform. Due to their infinite root spectra, control system analysis and synthesis based on such quasipolynomial models are usually mathematically heavy. In the light of this fact, there is a natural research endeavor to design a sufficiently accurate yet simple engineeringly acceptable method that approximates them by polynomials preserving basic spectral information. In this paper, such a procedure is presented based on some ideas of discrete-time (digital) filters designing without excessive math. Namely, the particular quasipolynomial is subjected to iterative discretization by means of the bilinear transformation first; consequently, linear and quadratic interpolations are applied to obtain integer powers of the approximating polynomial. Since dominant roots play a decisive role in the spectrum, interpolations are made in their very neighborhood. A simulation example proofs the algorithm efficiency. © Springer International Publishing Switzerland 2016
    • …
    corecore