Sciweavers

236 search results - page 17 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
DEBS
2010
ACM
13 years 9 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IEEEARES
2006
IEEE
14 years 2 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
CHI
2008
ACM
14 years 9 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle