Sciweavers

1018 search results - page 14 / 204
» Remote User Authentication Using Public Information
Sort
View
INTERACT
2003
15 years 1 months ago
Enticing People to Interact with Large Public Displays in Public Spaces
: Large displays are increasingly being placed in public places to support community and social activities. However, a major problem that has been observed with this new form of pu...
Harry Brignull, Yvonne Rogers
ICNSC
2007
IEEE
15 years 6 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 1 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IJAMC
2008
84views more  IJAMC 2008»
14 years 11 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...