Sciweavers

9503 search results - page 41 / 1901
» Authenticated System Calls
Sort
View
CCS
1999
ACM
15 years 8 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
15 years 4 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
ICASSP
2010
IEEE
15 years 4 months ago
Optimize the obvious: Automatic call flow generation
In commercial spoken dialog systems, call flows are built by call flow designers implementing a predefined business logic. While it may appear obvious from this logic how the c...
David Suendermann, Jackson Liscombe, Roberto Piera...
DSN
2009
IEEE
15 years 11 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...
ACL
1998
15 years 5 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter