Sciweavers

2399 search results - page 138 / 480
» On Authentication between Human and Computer
Sort
View
GAMEON
2008
15 years 5 months ago
Automatable Evaluation Method Oriented toward Behaviour Believability for Video Games
Classic evaluation methods of believable agents are time-consuming because they involve many human to judge agents. They are well suited to validate work on new believable behavio...
Fabien Tencé, Cédric Buche
ASPLOS
2006
ACM
15 years 10 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
150
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 10 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen