Sciweavers

411 search results - page 6 / 83
» User Authentication in Multidatabase Systems
Sort
View
HOST
2008
IEEE
14 years 2 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 1 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
BIOADIT
2006
Springer
13 years 11 months ago
A User Authentication System Using Schema of Visual Memory
Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Ma...
AMC
2005
131views more  AMC 2005»
13 years 7 months ago
A user friendly remote authentication scheme with smart cards against impersonation attacks
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards without requiring a password table. However, the password of a user is an un-human lengthy p...
Chien-Lung Hsu
TKDE
2002
140views more  TKDE 2002»
13 years 7 months ago
Transaction Processing in Mobile, Heterogeneous Database Systems
As technological advances are made in software and hardware, the feasibility of accessing information "any time, anywhere" is becoming a reality. Furthermore, the diversi...
James B. Lim, Ali R. Hurson