Sciweavers

9503 search results - page 94 / 1901
» Authenticated System Calls
Sort
View
149
Voted
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 11 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
DIM
2007
ACM
15 years 9 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
AINA
2008
IEEE
15 years 11 months ago
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
SIGMOD
2006
ACM
174views Database» more  SIGMOD 2006»
16 years 5 months ago
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to acce...
Feifei Li, Marios Hadjieleftheriou, George Kollios...
CCS
2009
ACM
15 years 11 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino