Sciweavers

12 search results - page 2 / 3
» Security enhancement of an IC-card-based remote login mechan...
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
COMCOM
2008
104views more  COMCOM 2008»
13 years 5 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
ESCIENCE
2005
IEEE
13 years 11 months ago
Grid-Enabling an Existing Instrument-Based National Service
Recent work by the ‘CombeChem’ project together with the UK National Crystallography Service (NCS) has integrated the NCS into an e-Science environment. The existing high-thro...
Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meac...
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 14 days ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
13 years 11 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...