Sciweavers

1627 search results - page 94 / 326
» High Security Smartcards
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
CCS
2001
ACM
15 years 8 months ago
Error-tolerant password recovery
Many encryption systems require the user to memorize high entropy passwords or passphrases and reproduce them exactly. This is often a difficult task. We propose a more fault-tole...
Niklas Frykholm, Ari Juels
KDD
2005
ACM
73views Data Mining» more  KDD 2005»
16 years 4 months ago
Using relational knowledge discovery to prevent securities fraud
We describe an application of relational knowledge discovery to a key regulatory mission of the National Association of Securities Dealers (NASD). NASD is the world's largest...
Özgür Simsek, David Jensen, Henry G. Gol...
ACSAC
2008
IEEE
15 years 10 months ago
OMOS: A Framework for Secure Communication in Mashup Applications
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these appli...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
ACSAC
2003
IEEE
15 years 9 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...