Sciweavers

1573 search results - page 36 / 315
» Strong User Authentication
Sort
View
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 11 months ago
Heterogeneous Strong Computation Migration
The continuous increasing in performance requirements, for both scientic computation and industry, motivates the need of a powerful computing infrastructure. The Grid appeared as ...
Anolan Milanés, Noemi de La Rocque Rodrigue...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 8 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
IJAMC
2008
84views more  IJAMC 2008»
13 years 11 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...
IACR
2011
137views more  IACR 2011»
12 years 10 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
CORR
2010
Springer
56views Education» more  CORR 2010»
13 years 11 months ago
An attack on MySQL's login protocol
The MySQL challenge
Ivan Arce, Emiliano Kargieman, Gerardo Richarte, C...