Sciweavers

632 search results - page 28 / 127
» Two Facets of Authentication
Sort
View
NSDI
2008
13 years 11 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
JUCS
2002
84views more  JUCS 2002»
13 years 8 months ago
The Design of an Object-based System for Representing and Classifying Spatial Structures and Relations
: Our work is concerned with the design of a knowledge-based system for recognizing agricultural landscape models on land-use maps. Landscape models are defined as sets of spatial ...
Florence Le Ber, Amedeo Napoli
NETWORKS
2011
13 years 3 months ago
On cut-based inequalities for capacitated network design polyhedra
In this article we study capacitated network design problems. We unify and extend polyhedral results for directed, bidirected and undirected link capacity models. Based on valid i...
Christian Raack, Arie M. C. A. Koster, Sebastian O...
HUC
2009
Springer
14 years 1 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
AMC
2005
172views more  AMC 2005»
13 years 8 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh