Sciweavers

2399 search results - page 13 / 480
» On Authentication between Human and Computer
Sort
View
74
Voted
ISWC
1999
IEEE
15 years 1 months ago
Situated Computing: Bridging the Gap between Intention and Action
Situated computing represents a new class of computing applications that bridges the gap between people's intentions and the actions they can take to achieve those intentions...
Anatole Gershman, Joseph F. McCarthy, Andrew E. Fa...
PERCOM
2005
ACM
15 years 9 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
JCS
2010
112views more  JCS 2010»
14 years 8 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
85
Voted
CIS
2007
Springer
15 years 3 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
WMASH
2003
ACM
15 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...