Sciweavers

1191 search results - page 110 / 239
» Online Games and Security
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Towards Modeling Trust Based Decisions: A Game Theoretic Approach
Current trust models enable decision support at an implicit level by means of thresholds or constraint satisfiability. Decision support is mostly included only for a single binary...
Vidyaraman Sankaranarayanan, Madhusudhanan Chandra...
CSI
2004
110views more  CSI 2004»
13 years 9 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang
FC
2008
Springer
133views Cryptology» more  FC 2008»
13 years 11 months ago
A Proof of Concept Attack against Norwegian Internet Banking Systems
Abstract. The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nation...
Yngve Espelid, Lars-Helge Netland, André N....
ICCCN
2008
IEEE
14 years 3 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
ICDAR
2005
IEEE
14 years 2 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...