Sciweavers

2399 search results - page 19 / 480
» On Authentication between Human and Computer
Sort
View
69
Voted
ICNS
2008
IEEE
15 years 4 months ago
Performance Study of PANA Pre-authentication for Interdomain Handover
—To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuo...
Patryk Chamuczynski, Omar Alfandi, Constantin Wern...
69
Voted
WS
2004
ACM
15 years 3 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
IV
2006
IEEE
95views Visualization» more  IV 2006»
15 years 3 months ago
A Pragmatic and Musically Pleasing Production System for Sonic Events
We describe a novel application for sonic events namely their generation via mathematical functions implemented on a universal all purpose Java platform. Their design is driven by...
Marc Conrad, Tim French, Marcia Gibson
CHI
2007
ACM
15 years 1 months ago
Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music
In this paper we describe the design experience gathered from creating an interactive exhibit about medieval music. This system was designed as an educational exhibit that relies ...
Marius Wolf, Eric Lee, Jan Borchers
SC
2009
ACM
15 years 2 months ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...