Sciweavers

24529 search results - page 145 / 4906
» Computing on Authenticated Data
Sort
View
138
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 8 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
168
Voted
SOUPS
2010
ACM
15 years 6 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
156
Voted
IMC
2009
ACM
15 years 9 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
145
Voted

Publication
117views
14 years 10 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
122
Voted
CVPR
2008
IEEE
15 years 9 months ago
The statistical modelling of fingerprint minutiae distribution with implications for fingerprint individuality studies
The spatial distribution of fingerprint minutiae is a core problem in the fingerprint individuality study, the cornerstone of the fingerprint authentication technology. Previously...
Jiansheng Chen, Yiu Sang Moon