Sciweavers

632 search results - page 58 / 127
» Two Facets of Authentication
Sort
View
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
14 years 23 days ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
TELE
1998
71views more  TELE 1998»
13 years 8 months ago
Anti-politics or the triumph of postmodern populism in promotional cultures?
Promotional cultures, to use Wernick’s expression, have transformed communication, as the ideology of the market seeps into every facet of social life. Promotional texts, whether...
Barrie Axford, Richard Huggins
SPW
2005
Springer
14 years 2 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
BIOID
2008
101views Biometrics» more  BIOID 2008»
13 years 11 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 8 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija