Sciweavers

340 search results - page 18 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
CLUSTER
2002
IEEE
14 years 21 days ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
ICPR
2008
IEEE
14 years 2 months ago
Scribble-a-Secret: Similarity-based password authentication using sketches
This paper presents a sketch-based password authentication system called Scribble-a-Secret as a graphical password scheme in which free-form drawings are used as a means to authen...
Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang,...
IMR
2004
Springer
14 years 1 months ago
API for Grid Generation Over Topological Models
Topological representations are being used to define geometric models suitable for grid generation and grid generation tools are being developed that work directly on topological ...
S. Gopalsamy, Douglas H. Ross, Alan M. Shih
SC
2005
ACM
14 years 1 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
SOUPS
2010
ACM
13 years 11 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell