Sciweavers

1656 search results - page 58 / 332
» Secure Computation Without Authentication
Sort
View
143
Voted
SOUPS
2010
ACM
15 years 4 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
111
Voted
PERCOM
2010
ACM
14 years 11 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
CCS
2005
ACM
15 years 6 months ago
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several ...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
CVPR
2007
IEEE
15 years 7 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon
CLUSTER
2002
IEEE
15 years 19 days ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson