Sciweavers

1018 search results - page 92 / 204
» Remote User Authentication Using Public Information
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
CCS
2009
ACM
14 years 2 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
MA
1999
Springer
155views Communications» more  MA 1999»
14 years 10 days ago
JGram: Rapid Development of Multi-Agent Pipelines for Real-World Tasks
Many real-world tasks can be decomposed into pipelines of sequential operations (where subtasks may themselves be composed of one or more pipelines). JGram is a framework enabling...
Rahul Sukthankar, Antoine Brusseau, Ray Pelletier,...
ICDAR
2005
IEEE
14 years 1 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
ICADL
2004
Springer
156views Education» more  ICADL 2004»
14 years 1 months ago
Digital Libraries: Developing Countries, Universal Access, and Information for All
Abstract. Digital libraries are large, organized collections of information objects. Well-designed digital library software has the potential to enable nonspecialist people to conc...
Ian H. Witten