Sciweavers

1150 search results - page 212 / 230
» Beacon Based Authentication
Sort
View
88
Voted
EUROMED
2010
15 years 1 months ago
Complementary Approach for Vernacular Wooden Frame Structures Reconstruction
The research is focused on traditional timber frame structures (TFS) situated in rural areas. Often neglected, remaining examples embody our build Heritage. However, architects hav...
Laurent Debailleux
INFOCOM
2010
IEEE
15 years 27 days ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
125
Voted
FOCS
2010
IEEE
15 years 13 days ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
127
Voted
ISW
2010
Springer
15 years 10 days ago
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the p...
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, H...
110
Voted
WIKIS
2010
ACM
15 years 8 days ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...