Sciweavers

24529 search results - page 144 / 4906
» Computing on Authenticated Data
Sort
View
127
Voted
P2P
2007
IEEE
110views Communications» more  P2P 2007»
15 years 9 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
117
Voted
SWS
2006
ACM
15 years 8 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
130
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
ACSAC
2004
IEEE
15 years 6 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
105
Voted
CHI
1997
ACM
15 years 6 months ago
Supporting Knowledge Workers Beyond the Desktop With Palplates
Palplates are a collection of touch-screen terminals placed around the office enabling human-computer interactions at the point of need. Supporting a community of mobile authentic...
Jennifer Mankoff, Bill N. Schilit