Sciweavers

286 search results - page 19 / 58
» Authentication in the Taos Operating System
Sort
View
SOUPS
2009
ACM
14 years 4 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 9 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
NBIS
2009
Springer
14 years 4 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
IJFCS
2007
93views more  IJFCS 2007»
13 years 10 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
ISTA
2001
13 years 11 months ago
Methodology of distributed technological complex system simulation
: The simulation of technological process in the oil pipelines system is considered in the paper. The solution of the task meets a number of difficulties originating during control...
Oye Fedorovich, A. V. Prohorov, Thomas Ramirez