Sciweavers

232 search results - page 1 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
SAINT
2002
IEEE
13 years 9 months ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...
ECTEL
2007
Springer
13 years 8 months ago
A Qualitative and Quantitative Evaluation of Adaptive Authoring of Adaptive Hypermedia
Currently, large amounts of research exist into the design and implementation of adaptive systems. The complex task of authoring of such systems, or their evaluation, is addressed ...
Maurice Hendrix, Alexandra I. Cristea
IACR
2011
137views more  IACR 2011»
12 years 4 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
JUCS
2008
127views more  JUCS 2008»
13 years 4 months ago
A Spiral Model for Adding Automatic, Adaptive Authoring to Adaptive Hypermedia
: At present a large amount of research exists into the design and implementation of adaptive systems. However, not many target the complex task of authoring in such systems, or th...
Maurice Hendrix, Alexandra I. Cristea