Sciweavers

920 search results - page 99 / 184
» Selecting Secure Passwords
Sort
View

Publication
283views
12 years 8 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
TSMC
2008
162views more  TSMC 2008»
13 years 9 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
VLDB
2002
ACM
74views Database» more  VLDB 2002»
13 years 9 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
NGC
2007
Springer
128views Communications» more  NGC 2007»
13 years 9 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...