Sciweavers

299 search results - page 6 / 60
» Deniable Authentication on the Internet
Sort
View
IEEESP
2006
68views more  IEEESP 2006»
13 years 7 months ago
Secure Internet Banking Authentication
Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold
WWW
2006
ACM
14 years 8 months ago
Strong authentication in web proxies
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
Domenico Rotiroti
CEAS
2006
Springer
13 years 11 months ago
Algorithmically Determining Store-and-Forward MTA Relays Using DomainKeys
Store-and-forward MTA relaying servers have frequently presented problems to various antispam techniques, such as IPbased reputation or email authentication. Algorithms that find ...
Miles Libbey, Peter Ludemann
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 1 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
LCN
2006
IEEE
14 years 1 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood