Sciweavers

CSREASAM
2008
14 years 1 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
CSREASAM
2008
14 years 1 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
CSREASAM
2008
14 years 1 months ago
Efficient Biometrics Remote User Authentication Scheme
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication s...
Ming-Jheng Li, Justie Su-tzu Juan
CSREASAM
2008
14 years 1 months ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock
CSREASAM
2008
14 years 1 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé
GIL
2010
14 years 1 months ago
Formale Modellierung landwirtschaftlicher Standards mit RIF und OWL
: Standards zum Pflanzenbau und Betriebsmanagement werden immer wichtiger f
Edward Nash, Jens Wiebensohn
CSREASAM
2007
14 years 1 months ago
Further Discussions on the Security of a Nominative Signature Scheme
A nominative signature scheme allows a nominator (or signer) and a nominee (or verifier) to jointly generate and publish a signature in such a way that only the nominee can verify...
Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu
CSREASAM
2007
14 years 1 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham