94 research outputs found

    Defining Global Benchmarks for Laparoscopic Liver Resections: An International Multicenter Study

    Get PDF

    Impact of tumor size on the difficulty of laparoscopic left lateral sectionectomies

    Get PDF

    Impact of liver cirrhosis, the severity of cirrhosis, and portal hypertension on the outcomes of minimally invasive left lateral sectionectomies for primary liver malignancies

    Get PDF

    Impact of liver cirrhosis, severity of cirrhosis and portal hypertension on the difficulty of laparoscopic and robotic minor liver resections for primary liver malignancies in the anterolateral segments

    Get PDF

    A Study on Using Emojis in a Shoulder Surfing Resistant Authentication Method

    No full text
    While images or emojis offer good memorability when used in an authentication method, inherently graphical data are highly susceptible to shoulder surfing attacks. An authentication system incorporating emojis was proposed and designed, which offers resistance to shoulder surfing attacks. The proposed system implements emojis in place of numerics in the reference method, DragPIN, and adds cue questions. The methods are compared in terms of performance and memorability, through user testing. The proposed authentication system was found to be successful at resisting shoulder surfing attacks. After 4–6 weeks, memorability was also higher in the proposed method compared to the reference method

    Methods to Eye Gaze Interaction for Authentication

    No full text
    One of the methods touted to reduce shoulder surfing during onscreen authentication is eye gaze input. Eye gaze authentication methods have thus far relied on a few methods for selection of on screen objects, namely dwell time, blinking, eye gestures and pursuit of moving objects. This paper surveys the literature on the various approaches. From analysis of the advantages and drawbacks of the surveyed approaches, we find that the dwell method has advantages in security and usability. We then describe a method designed previously by the authors that enhances the dwell method by making use of peripheral vision. The proposed method is in the ideation stag

    Vulnerabilities in Online Food Ordering Website

    No full text
    In this paper, we show several vulnerabilities in the ordering mechanism of one of Malaysia’s online food ordering services company (which we will call “Company X”) website. In particular, we show that the system is open to several kinds of abuse, demonstrating two proof-of-concept attacks we carried out, as well as discuss more potentially disruptive theoretical attacks. We also suggest several countermeasures to rectify the issues, that are not only applicable to Company X website, but also to other similar online ordering systems
    corecore