Sciweavers

9503 search results - page 74 / 1901
» Authenticated System Calls
Sort
View
86
Voted
IJIIP
2010
83views more  IJIIP 2010»
15 years 1 months ago
An Improved Biometrics-based User Authentication Scheme without Concurrency System
Chin-Chen Chang, Shih-Chang Chang, Yu-Wei Lai
JCS
2010
151views more  JCS 2010»
14 years 11 months ago
Biometric template protection in multimodal authentication systems based on error correcting codes
Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthen...
122
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
129
Voted
ACSAC
2009
IEEE
15 years 8 months ago
RAD: Reflector Attack Defense Using Message Authentication Codes
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...
116
Voted
MMNS
2003
69views Multimedia» more  MMNS 2003»
15 years 6 months ago
Authentication Issues in Multi-service Residential Access Networks
Abstract. Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user...
Judith E. Y. Rossebø, John Ronan, Kristian ...