Sciweavers

1018 search results - page 69 / 204
» Remote User Authentication Using Public Information
Sort
View
ISSA
2008
13 years 9 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
AINA
2007
IEEE
14 years 2 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
TGIS
2002
175views more  TGIS 2002»
13 years 7 months ago
Using Ontologies for Integrated Geographic Information Systems
Today, there is a huge amount of data gathered about the Earth, not only from new spatial information systems, but also from new and more sophisticated data collection technologie...
Frederico T. Fonseca, Max J. Egenhofer, Peggy Agou...
SIGUCCS
2000
ACM
13 years 11 months ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen