Sciweavers

632 search results - page 102 / 127
» Two Facets of Authentication
Sort
View
130
Voted
SOUPS
2009
ACM
15 years 10 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...
190
Voted
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 10 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICCCN
2008
IEEE
15 years 10 months ago
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 s...
Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai...
ICPR
2008
IEEE
15 years 10 months ago
Online personal identification in night using multiple face representations
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
Ajay Kumar, T. Srikanth
IEEEARES
2008
IEEE
15 years 10 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul