Sciweavers

503 search results - page 19 / 101
» Authenticity by tagging and typing
Sort
View
ESOP
2011
Springer
13 years 6 days ago
Typing Local Control and State Using Flow Analysis
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
DCC
2007
IEEE
14 years 8 months ago
Type-Based Compression of XML Data
The extensible markup language XML has become indispensable in many areas, but a significant disadvantage is its size: tagging a set of data increases the space needed to store it...
Christopher League, Kenjone Eng
ICSNC
2007
IEEE
14 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 2 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
PERCOM
2007
ACM
14 years 8 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins