Sciweavers

1769 search results - page 193 / 354
» Cryptography
Sort
View
WETICE
2003
IEEE
15 years 9 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
137
Voted
SACMAT
2003
ACM
15 years 9 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
112
Voted
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 9 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
126
Voted
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 9 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
130
Voted
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
15 years 9 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung