Sciweavers

9503 search results - page 83 / 1901
» Authenticated System Calls
Sort
View
AVBPA
2005
Springer
319views Biometrics» more  AVBPA 2005»
15 years 10 months ago
A Study of Brute-Force Break-ins of a Palmprint Verification System
Abstract. Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has le...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel
130
Voted
DIAU
2000
Springer
15 years 9 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CISS
2008
IEEE
15 years 11 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ESORICS
2002
Springer
16 years 4 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...