Sciweavers

637 search results - page 90 / 128
» A Privacy Enhanced Service Architecture for Mobile Users
Sort
View
ICICS
2003
Springer
14 years 3 months ago
A Novel Two-Level Trust Model for Grid
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Tieyan Li, Huafei Zhu, Kwok-Yan Lam
SIGMOD
2008
ACM
145views Database» more  SIGMOD 2008»
14 years 10 months ago
The Claremont report on database research
In late May, 2008, a group of database researchers, architects, users and pundits met at the Claremont Resort in Berkeley, California to discuss the state of the research field an...
Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bern...
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
14 years 3 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
CCS
2001
ACM
14 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
PERCOM
2006
ACM
14 years 9 months ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...