Sciweavers

411 search results - page 30 / 83
» User Authentication in Multidatabase Systems
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
ACISP
2010
Springer
13 years 10 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
MOBISYS
2009
ACM
14 years 9 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
ISSE
2008
13 years 10 months ago
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
David Hernando, David Gómez, Javier Rodr&ia...