Sciweavers

411 search results - page 56 / 83
» User Authentication in Multidatabase Systems
Sort
View
EMNLP
2009
13 years 6 months ago
Statistical Estimation of Word Acquisition with Application to Readability Prediction
Models of language learning play a central role in a wide range of applications: from psycholinguistic theories of how people acquire new word knowledge, to information systems th...
Paul Kidwell, Guy Lebanon, Kevyn Collins-Thompson
BROADNETS
2005
IEEE
14 years 2 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ITCC
2005
IEEE
14 years 2 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IDTRUST
2010
ACM
14 years 1 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
IWIA
2005
IEEE
14 years 2 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen