Sciweavers

1466 search results - page 58 / 294
» Completeness of the Authentication Tests
Sort
View
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 1 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
JEI
2006
125views more  JEI 2006»
13 years 8 months ago
Image manipulation detection
Abstract. Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently ...
Sevinc Bayram, Ismail Avcibas, Bülent Sankur,...
AICT
2006
IEEE
100views Communications» more  AICT 2006»
14 years 2 months ago
A Concept Model for Computer-based Spoken Language Tests
Spoken language education plays an important role in modern language courses. Computer-based spoken language test systems provide a convenient, efficient and reliable approach to ...
Yijian Wu, Wenyun Zhao, Xin Peng, Yunjiao Xue
SOUPS
2009
ACM
14 years 2 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
ESORICS
2009
Springer
14 years 5 days ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel