Sciweavers

464 search results - page 56 / 93
» Identity Management
Sort
View
ACISP
2000
Springer
14 years 1 days ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
ELPUB
1999
ACM
14 years 16 hour ago
The UK Children's Publishing House - Adapting to Change for the Multimedia Market
The research project currently in progress aims to develop a comprehensive understanding of the children’s multimedia publishing industry in the UK and the challenges of adapting...
Audrey Anthoney, Jo Royle, Ian M. Johnson
ICISS
2007
Springer
13 years 11 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CSMR
2004
IEEE
13 years 11 months ago
Using Split Objects for Maintenance and Reengineering Tasks
Language integration is an important issue in the area of software maintenance and reengineering. We describe a novel solution in this area: automatically applied and composed spl...
Uwe Zdun
KES
2000
Springer
13 years 11 months ago
Genetically optimised feedforward neural networks for speaker identification
The problem of establishing the identity of a speaker from a given utterance has been conventionally addressed using techniques such as Gaussian Mixture Models (GMM's) that m...
Richard C. Price, Jonathan P. Willmore, William J....