Sciweavers

255 search results - page 22 / 51
» Principles for Entity Authentication
Sort
View
OZCHI
2009
ACM
14 years 3 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
CN
2004
108views more  CN 2004»
13 years 8 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 1 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
TNC
2004
146views Education» more  TNC 2004»
13 years 10 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
ICCS
2004
Springer
14 years 1 months ago
Multiparadigm Model Oriented to Development of Grid Systems
Multiparadigm approach integrates programming language paradigms. We propose Holoparadigm (Holo) as a multiparadigm model oriented to development of grid systems. Holo uses a logi...
Jorge L. V. Barbosa, Cristiano André da Cos...