Sciweavers

340 search results - page 25 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
ASIACRYPT
2003
Springer
13 years 11 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
ICVGIP
2008
13 years 9 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
PG
2007
IEEE
14 years 2 months ago
Exact Evaluation of Non-Polynomial Subdivision Schemes at Rational Parameter Values
In this paper, we describe a method for exact evaluation of a limit mesh defined via subdivision on a uniform grid of any size. Other exact evaluation technique either restrict t...
Scott Schaefer, Joe D. Warren
IJHPCA
2006
117views more  IJHPCA 2006»
13 years 7 months ago
Recent Developments in Gridsolve
The purpose of GridSolve is to create the middleware necessary to provide a seamless bridge between the simple, standard programming interfaces and desktop systems that dominate t...
Asim YarKhan, Keith Seymour, Kiran Sagi, Zhiao Shi...