Sciweavers

1018 search results - page 82 / 204
» Remote User Authentication Using Public Information
Sort
View
IJNVO
2011
47views more  IJNVO 2011»
13 years 3 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
USENIX
2003
13 years 9 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
ACSAC
1999
IEEE
14 years 13 days ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
ATAL
2008
Springer
13 years 10 months ago
The identification of users by relational agents
Virtual agents designed to establish relationships with more than one user must be able to identify and distinguish among those users with high reliability. We descr...
Daniel Schulman, Mayur Sharma, Timothy W. Bickmore
IEAAIE
2009
Springer
14 years 2 months ago
RFID Technology and AI Techniques for People Location, Orientation and Guiding
One of the main problems that we have to face when visiting public or official buildings (i.e hospitals or public administrations) is the lack of information and signs that can gui...
M. D. R-Moreno, Bonifacio Castaño, Melquiad...