Sciweavers

1018 search results - page 100 / 204
» Remote User Authentication Using Public Information
Sort
View
HPCS
2005
IEEE
14 years 1 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
CHI
2008
ACM
14 years 8 months ago
Handsaw: tangible exploration of volumetric data by direct cut-plane projection
Tangible User Interfaces are well-suited to handling threedimensional data sets by direct manipulation of real objects in space, but current interfaces can make it difficult to lo...
Leonardo Bonanni, Jason Alonso, Neil Chao, Greg Va...
DIM
2005
ACM
13 years 10 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
ACISP
2001
Springer
14 years 17 days ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
WWW
2005
ACM
14 years 8 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni