Sciweavers

6861 search results - page 141 / 1373
» Security for Ubiquitous Computing
Sort
View
121
Voted
MOC
2010
14 years 11 months ago
Computing matrix representations
Let G be a ...nite group and be a faithful irreducible character for G. Earlier papers by the ...rst author describe techniques for computing a matrix representation for G which a
Vahid Dabbaghian, John D. Dixon
AISM
2004
15 years 5 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende
CCS
2010
ACM
15 years 4 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
FC
2009
Springer
142views Cryptology» more  FC 2009»
15 years 10 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
147
Voted
ICCS
2005
Springer
15 years 9 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...