Sciweavers

981 search results - page 82 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
WETICE
2003
IEEE
15 years 6 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
RE
2007
Springer
15 years 7 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
152
Voted
SOUPS
2010
ACM
15 years 5 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
EUROPKI
2004
Springer
15 years 7 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
AAAI
1996
15 years 2 months ago
Supporting Performance and Configuration Management of GTE Cellular Networks
GTE Laboratories, in cooperation with GTE Mobilnet, has developed and deployed PERFFEX (PERFormance Expert), an intelligent system for performance and configuration management of ...
Ming Tan, Carol Lafond, Gabriel Jakobson, Gary You...