Sciweavers

1573 search results - page 12 / 315
» Strong User Authentication
Sort
View
IPTPS
2004
Springer
14 years 23 days ago
Peer-to-Peer Authentication with a Distributed Single Sign-On Service
Abstract. CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication serve...
William K. Josephson, Emin Gün Sirer, Fred B....
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 4 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
GI
2004
Springer
14 years 24 days ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...
SOUPS
2009
ACM
14 years 1 months ago
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures
This paper investigate security of graphical authentication tokens against educated guess attacks. Results of two user studies indicate that, if we use original photos as authenti...
Eiji Hayashi, Jason Hong, Nicolas Christin
SOSP
2003
ACM
14 years 4 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...