Sciweavers

24529 search results - page 80 / 4906
» Computing on Authenticated Data
Sort
View
HUC
2009
Springer
14 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
NTMS
2009
IEEE
14 years 4 months ago
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Abstract—It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, conï...
Detlef Hühnlein, Ulrike Korte, Lucie Langer, ...
AINA
2007
IEEE
14 years 4 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
MSS
2005
IEEE
79views Hardware» more  MSS 2005»
14 years 3 months ago
Mitigating Risk of Data Loss in Preservation Environments
1 Preservation environments manage digital records for time periods that are much longer than that of a single vendor product. A primary requirement is the preservation of the auth...
Reagan W. Moore, Joseph JáJá, Robert...
CHI
2008
ACM
14 years 10 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle