Sciweavers

24529 search results - page 279 / 4906
» Computing on Authenticated Data
Sort
View
119
Voted
FC
2009
Springer
142views Cryptology» more  FC 2009»
15 years 10 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
MUE
2007
IEEE
100views Multimedia» more  MUE 2007»
15 years 10 months ago
Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core Network
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...
ACSAC
2006
IEEE
15 years 10 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
176
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao
101
Voted
ITRE
2005
IEEE
15 years 9 months ago
Integrated use of Web technologies to deliver a secure collaborative Web portal
This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different te...
Victor Chang