Sciweavers

293 search results - page 22 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
MOBICOM
1999
ACM
13 years 12 months ago
Next Century Challenges: Data-Centric Networking for Invisible Computing
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
Mike Esler, Jeffrey Hightower, Thomas E. Anderson,...
GRID
2004
Springer
14 years 29 days ago
Walden: A Scalable Solution for Grid Account Management
— A large and diverse consortium of grid clusters, as can be found in a university setting, requires a flexible authorization model that is scalable, extensible and easy to admi...
Beth A. Kirschner, Thomas J. Hacker, William A. Ad...
AINA
2009
IEEE
14 years 2 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
MMMACNS
2001
Springer
14 years 1 days ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...