Sciweavers

89 search results - page 4 / 18
» Keystroke dynamics for user authentication
Sort
View
JCIT
2010
189views more  JCIT 2010»
13 years 2 months ago
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme
In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs...
Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu
CORR
2010
Springer
212views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
MASCOTS
2003
13 years 9 months ago
Using User Interface Event Information in Dynamic Voltage Scaling Algorithms
Increasingly, mobile computers use dynamic voltage scaling (DVS) to reduce CPU voltage and speed and thereby increase battery life. To determine how to change voltage and speed wh...
Jacob R. Lorch, Alan Jay Smith
IJNSEC
2008
155views more  IJNSEC 2008»
13 years 7 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell