Sciweavers

2187 search results - page 318 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
CSI
2007
91views more  CSI 2007»
13 years 9 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
SASN
2004
ACM
14 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ICALT
2008
IEEE
14 years 3 months ago
Moving Towards Life-Long User Modeling
User Modeling is the core component for the majority of personalization services. It has become an important factor in the effort to personalise a diversity of web resources accor...
Demetris Kyriacou, Hugh C. Davis
ESCIENCE
2006
IEEE
14 years 3 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...