Sciweavers

503 search results - page 56 / 101
» Authenticity by tagging and typing
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ESORICS
2009
Springer
14 years 21 days ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
RFIDSEC
2010
13 years 7 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
CLEF
2007
Springer
14 years 3 months ago
Finding Answers Using Resources in the Internet
In this paper we describe our experiments in finding answers from documents based on statistical and linguistic knowledge. We collected the candidate answers from sources available...
Mirna Adriani, Septian Adiwibowo
DAS
2004
Springer
14 years 2 months ago
A Complete Approach to the Conversion of Typewritten Historical Documents for Digital Archives
This paper presents a complete system that historians/archivists can use to digitize whole collections of documents relating to personal information. The system integrates tools an...
Apostolos Antonacopoulos, Dimosthenis Karatzas