Sciweavers

75 search results - page 1 / 15
» A Self-Concealing Mechanism for Authentication of Portable C...
Sort
View
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 4 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
PERCOM
2006
ACM
14 years 4 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
SBACPAD
2005
IEEE
110views Hardware» more  SBACPAD 2005»
13 years 10 months ago
Portable checkpointing and communication for BSP applications on dynamic heterogeneous Grid environments
Executing long-running parallel applications in Opportunistic Grid environments composed of heterogeneous, shared user workstations, is a daunting task. Machines may fail, become ...
Raphael Y. de Camargo, Fabio Kon, Alfredo Goldman
ISORC
2006
IEEE
13 years 10 months ago
Portable Data Exchange for Remote-Testing Frameworks
To communicate between heterogeneous computer systems, mechanisms for data conversion are necessary. In this paper we present a portable, asymmetric data conversion method that is...
Raimund Kirner, Peter P. Puschner, Ingomar Wenzel,...
WIMOB
2007
IEEE
13 years 11 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...