Sciweavers

98 search results - page 11 / 20
» Risks of the CardSpace Protocol
Sort
View
ACSAC
2008
IEEE
14 years 1 months ago
pwdArmor: Protecting Conventional Password-Based Authentications
pwdArmor is a framework for fortifying conventional password-based authentications. Many password protocols are performed within an encrypted tunnel (e.g., TLS) to prevent the exp...
Timothy W. van der Horst, Kent E. Seamons
EUROPAR
2005
Springer
14 years 1 months ago
MADIS: A Slim Middleware for Database Replication
Availability and performance can be improved using data replication as the basic technique, thus benefitting the services provided by a distributed system. However, replication im...
Luis Irún-Briz, Hendrik Decker, Rubé...
VTC
2007
IEEE
14 years 1 months ago
Context-Based Communications Dimensioning for Safety Applications in Wireless Vehicular Systems
—The use of wireless vehicular communication systems for traffic safety applications imposes a careful and adequate communications dimensioning to ensure the transmission of broa...
Miguel Sepulcre, Javier Gozálvez
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
ECOOP
2008
Springer
13 years 9 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...