Sciweavers

859 search results - page 134 / 172
» Security for Key Management Interfaces
Sort
View
LCN
1999
IEEE
14 years 2 months ago
An Intelligent Hub Protocol for Local Area Lightwave Networks
This paper presents a protocol for packet switched optical LANs using a star topology. The key element in this network is the use of an intelligent hub, which controls the traffic...
Dale Callahan, Gary J. Grimes
ICISS
2007
Springer
14 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CHI
2005
ACM
14 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
ECEH
2006
155views Healthcare» more  ECEH 2006»
13 years 11 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...
JSW
2007
124views more  JSW 2007»
13 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon