Sciweavers

859 search results - page 134 / 172
» Security for Key Management Interfaces
Sort
View
LCN
1999
IEEE
15 years 6 months ago
An Intelligent Hub Protocol for Local Area Lightwave Networks
This paper presents a protocol for packet switched optical LANs using a star topology. The key element in this network is the use of an intelligent hub, which controls the traffic...
Dale Callahan, Gary J. Grimes
130
Voted
ICISS
2007
Springer
15 years 6 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
121
Voted
CHI
2005
ACM
16 years 2 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
129
Voted
ECEH
2006
155views Healthcare» more  ECEH 2006»
15 years 4 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...
JSW
2007
124views more  JSW 2007»
15 years 2 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon