Sciweavers

1018 search results - page 21 / 204
» Remote User Authentication Using Public Information
Sort
View
MMS
2006
14 years 11 months ago
Using Private and Public Context - An Approach for Mobile Discovery and Search Services
Abstract: When using context information for the customization of mobile applications, privacy issues are important as users want to limit the amount of context information that is...
Thomas Butter, Sina Deibert, Franz Rothlauf
ISW
2009
Springer
15 years 6 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
ICCS
2004
Springer
15 years 5 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
NSPW
2003
ACM
15 years 5 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 5 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...