Sciweavers

1573 search results - page 51 / 315
» Strong User Authentication
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 11 months ago
On the Capacity of the 2-user Gaussian MAC Interfering with a P2P Link
Abstract--A multiple access channel and a point-to-point channel sharing the same medium for communications are considered. We obtain an outer bound for the capacity region of this...
Anas Chaaban, Aydin Sezgin
EGC
2005
Springer
14 years 4 months ago
HotGrid: Graduated Access to Grid-Based Science Gateways
Abstract. We describe the idea of a Science Gateway, an applicationspeciļ¬c task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Roy Williams, Conrad Steenberg, Julian J. Bunn
CHI
2010
ACM
14 years 4 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
USS
2008
14 years 1 months ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
WWW
2007
ACM
14 years 11 months ago
A password stretching method using user specific salts
In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
ChangHee Lee, Heejo Lee