Sciweavers

1242 search results - page 3 / 249
» Digital Objects as Passwords
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SIGUCCS
2003
ACM
14 years 9 days ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 14 days ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
ACSW
2007
13 years 8 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
ICDIM
2008
IEEE
14 years 1 months ago
A framework for transient objects in Digital Libraries
Digital Libraries maintain information lifecycles for the digital objects contained therein. Typically these information lifecycles stipulate that a digital object is deleted at t...
Tjalve Aarflot, Cathal Gurrin, Dag Johansen