Sciweavers

9503 search results - page 107 / 1901
» Authenticated System Calls
Sort
View
147
Voted
CCS
2009
ACM
15 years 9 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
121
Voted
CONCUR
2005
Springer
15 years 10 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
15 years 11 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 11 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
167
Voted
AVBPA
2005
Springer
460views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Fingerprint Quality Indices for Predicting Authentication Performance
The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. In this paper, two new quality indices for fi...
Yi Chen, Sarat C. Dass, Anil K. Jain