Sciweavers

411 search results - page 23 / 83
» User Authentication in Multidatabase Systems
Sort
View
CSREASAM
2006
13 years 10 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
BCSHCI
2008
13 years 10 months ago
Influencing users towards better passwords: persuasive cued click-points
Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An importa...
Sonia Chiasson, Alain Forget, Robert Biddle, Paul ...
DIAU
2000
Springer
14 years 1 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 3 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
14 years 24 days ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy