Sciweavers

9503 search results - page 32 / 1901
» Authenticated System Calls
Sort
View
POPL
1997
ACM
15 years 8 months ago
Call by Need Computations to Root-Stable Form
The following theorem of Huet and L
Aart Middeldorp
WIMOB
2007
IEEE
15 years 10 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
INFOCOM
2008
IEEE
15 years 10 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang
CSREASAM
2008
15 years 5 months ago
Efficient Biometrics Remote User Authentication Scheme
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication s...
Ming-Jheng Li, Justie Su-tzu Juan
MANSCI
2008
119views more  MANSCI 2008»
15 years 4 months ago
Service-Level Differentiation in Call Centers with Fully Flexible Servers
We study large-scale service systems with multiple customer classes and many statistically identical servers. The following question is addressed: How many servers are required (s...
Itay Gurvich, Mor Armony, Avishai Mandelbaum