Sciweavers

609 search results - page 54 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
WEBDB
2010
Springer
171views Database» more  WEBDB 2010»
14 years 2 months ago
Improved Recommendations via (More) Collaboration
We consider in this paper a popular class of recommender systems that are based on Collaborative Filtering (CF for short). CF is the process of predicting customer ratings to item...
Rubi Boim, Haim Kaplan, Tova Milo, Ronitt Rubinfel...
ISESE
2002
IEEE
14 years 2 months ago
Verification and Validation in Industry -- A Qualitative Survey on the State of Practice
Verification and validation activities take a substantial share of project budgets and need improvements. This is an accepted truth, but the current practices are seldom assessed ...
Carina Andersson, Per Runeson
SEC
2001
13 years 11 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
JOC
2007
133views more  JOC 2007»
13 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...