Sciweavers

1466 search results - page 146 / 294
» Completeness of the Authentication Tests
Sort
View
EAGC
2003
Springer
14 years 1 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 18 days ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
CCS
2006
ACM
13 years 11 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
CNIS
2006
13 years 9 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller
ICHIM
2001
123views more  ICHIM 2001»
13 years 9 months ago
Digital Video and Hypermedia Based New Services for Working on Patrimonial Archives
The "Institut National de I'Audiovisuel" (1NA) is in charge of keeping records of national TV broadcasts. Its main function is to provide TV producers with authenti...
Marc Nanard, Jocelyne Nanard, David Genest, Michel...