Sciweavers

22 search results - page 2 / 5
» Competition between SOM Clusters to Model User Authenticatio...
Sort
View
NDSS
2003
IEEE
13 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CCS
2001
ACM
13 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ESWA
2008
219views more  ESWA 2008»
13 years 5 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
13 years 10 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen
CCGRID
2008
IEEE
13 years 11 months ago
GridBatch: Cloud Computing for Large-Scale Data-Intensive Batch Applications
To be competitive, Enterprises are collecting and analyzing increasingly large amount of data in order to derive business insights. However, there are at least two challenges to m...
Huan Liu, Dan Orban