Sciweavers

9503 search results - page 39 / 1901
» Authenticated System Calls
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
ESORICS
2009
Springer
15 years 8 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
RSKT
2009
Springer
15 years 11 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 4 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
FLAIRS
2000
15 years 5 months ago
Supporting Intelligent Tutoring in CALL by Modeling the User's Grammar
This paper presents a model for representing the pro ciency of users in a CALL system by recording their performance on speci c grammatical features. The model will be used both t...
Lisa N. Michaud, Kathleen F. McCoy