Sciweavers

299 search results - page 27 / 60
» Deniable Authentication on the Internet
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 7 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
DIM
2006
ACM
14 years 1 months ago
OpenID 2.0: a platform for user-centric identity management
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all proble...
David Recordon, Drummond Reed
WWW
2007
ACM
14 years 8 months ago
A password stretching method using user specific salts
In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
ChangHee Lee, Heejo Lee
AH
2008
Springer
14 years 2 months ago
Learner Modelling in Exploratory Learning for Mathematical Generalisation
Exploratory learning supports creative thinking, allowing learners to control their own learning process, whilst it provides them with help and guidance when necessary. This pedago...
Mihaela Cocea