Sciweavers

2261 search results - page 40 / 453
» Dynamic types for authentication
Sort
View
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 8 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
13 years 8 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
FPLAY
2008
13 years 10 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
JEI
2002
152views more  JEI 2002»
13 years 8 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon