Sciweavers

164 search results - page 22 / 33
» Usable presentation of secure pseudonyms
Sort
View
ISSA
2008
13 years 9 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
DRM
2007
Springer
14 years 1 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
IEEEARES
2007
IEEE
14 years 2 months ago
Dirichlet Reputation Systems
— Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The bas...
Audun Jøsang, Jochen Haller
EUROPKI
2004
Springer
14 years 1 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell