Sciweavers

1573 search results - page 42 / 315
» Strong User Authentication
Sort
View
JDCTA
2010
164views more  JDCTA 2010»
13 years 5 months ago
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing
With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There ...
Lu Lu, Xiuxia Quan
OZCHI
2006
ACM
14 years 4 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
ICDAR
2009
IEEE
14 years 5 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
14 years 4 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
ICDM
2006
IEEE
95views Data Mining» more  ICDM 2006»
14 years 5 months ago
TOP-COP: Mining TOP-K Strongly Correlated Pairs in Large Databases
Recently, there has been considerable interest in computing strongly correlated pairs in large databases. Most previous studies require the specification of a minimum correlation...
Hui Xiong, Mark Brodie, Sheng Ma