Sciweavers

9503 search results - page 4 / 1901
» Authenticated System Calls
Sort
View
USS
2004
14 years 7 days ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
14 years 4 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
14 years 4 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
COMCOM
2002
86views more  COMCOM 2002»
13 years 10 months ago
Call admission control for reducing dropped calls in CDMA cellular systems
Yue Ma, James J. Han, Kishor S. Trivedi
PERCOM
2006
ACM
14 years 10 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik