Sciweavers

1018 search results - page 100 / 204
» Remote User Authentication Using Public Information
Sort
View
HPCS
2005
IEEE
15 years 8 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
CHI
2008
ACM
16 years 2 months ago
Handsaw: tangible exploration of volumetric data by direct cut-plane projection
Tangible User Interfaces are well-suited to handling threedimensional data sets by direct manipulation of real objects in space, but current interfaces can make it difficult to lo...
Leonardo Bonanni, Jason Alonso, Neil Chao, Greg Va...
157
Voted
DIM
2005
ACM
15 years 4 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
ACISP
2001
Springer
15 years 6 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
WWW
2005
ACM
16 years 3 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni