Sciweavers

9503 search results - page 6 / 1901
» Authenticated System Calls
Sort
View
ESORICS
1998
Springer
14 years 3 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
13 years 8 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 4 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
USENIX
2003
14 years 7 days ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
CODASPY
2012
12 years 6 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...