Sciweavers

286 search results - page 9 / 58
» Authentication in the Taos Operating System
Sort
View
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
USENIX
2003
13 years 9 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
USENIX
2008
13 years 10 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 1 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
CIKM
2010
Springer
13 years 5 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...