Sciweavers

255 search results - page 4 / 51
» Principles for Entity Authentication
Sort
View

Lecture Notes
5297views
15 years 5 months ago
Database-Management Principles And Applications
The Lecture notes covers database architecture, design, administration, and implementation. Evaluation and use of database-management systems for computers, with emphasis on microc...
R. E. Wyllys
AFRICACRYPT
2009
Springer
14 years 2 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
ESORICS
2004
Springer
14 years 23 days ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
CIKM
2010
Springer
13 years 6 months ago
Entity ranking using Wikipedia as a pivot
In this paper we investigate the task of Entity Ranking on the Web. Searchers looking for entities are arguably better served by presenting a ranked list of entities directly, rat...
Rianne Kaptein, Pavel Serdyukov, Arjen P. de Vries...
EVOTING
2004
91views Hardware» more  EVOTING 2004»
13 years 8 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter