Sciweavers

920 search results - page 68 / 184
» Selecting Secure Passwords
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 9 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
CSCW
2010
ACM
14 years 4 months ago
The roles that make the domestic work
This paper builds on earlier CSCW studies of domestic technologies, looking at the frequent maintenance required by new security technologies that households are adopting to provi...
Jennifer A. Rode
DICTA
2007
13 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
14 years 3 months ago
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatical...
Yi C. Feng, Pong C. Yuen