Sciweavers

234 search results - page 44 / 47
» Security Aspects of the Authentication Used in Quantum Crypt...
Sort
View
HUC
2010
Springer
13 years 9 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
IPCCC
2007
IEEE
14 years 2 months ago
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture
— Recently, there has been increased interest, shown by the research community and by industry fora, to enable emergency services for voice-over-IP based architectures. In order ...
Hannes Tschofenig, Henning Schulzrinne, Murugaraj ...
INFOCOM
2006
IEEE
14 years 2 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
SOUPS
2010
ACM
14 years 13 days ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
WISA
2004
Springer
14 years 1 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...