Sciweavers

154 search results - page 25 / 31
» A Secure YS-Like User Authentication Scheme
Sort
View
WWW
2005
ACM
14 years 8 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
FPL
2006
Springer
147views Hardware» more  FPL 2006»
13 years 11 months ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
14 years 7 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
PDCAT
2005
Springer
14 years 28 days ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
EUROPAR
2005
Springer
14 years 29 days ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo