Sciweavers

1573 search results - page 26 / 315
» Strong User Authentication
Sort
View
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 4 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
ICBA
2004
Springer
123views Biometrics» more  ICBA 2004»
14 years 4 months ago
User Authentication through Typing Biometrics Features
Lívia C. F. Araújo, Luiz H. R. Sucup...
ACSAC
1999
IEEE
14 years 3 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
DIM
2007
ACM
14 years 2 months ago
Certificate-less user authentication with consent
Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi
BIOADIT
2006
Springer
14 years 2 months ago
A User Authentication System Using Schema of Visual Memory
Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Ma...