Sciweavers

1365 search results - page 121 / 273
» Simple authentication for the web
Sort
View
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 7 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
117
Voted
IPTPS
2003
Springer
15 years 6 months ago
Scooped, Again
The Peer-to-Peer (p2p) and Grid infrastructure communities are tackling an overlapping set of problems. In addressing these problems, p2p solutions are usually motivated by elegan...
Jonathan Ledlie, Jeffrey Shneidman, Margo I. Seltz...
MOBILITY
2009
ACM
15 years 6 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ISADS
1999
IEEE
15 years 5 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CCGRID
2004
IEEE
15 years 5 months ago
Net-dbx-G: a Web-based debugger of MPI programs over Grid environments
Net-dbx-G is a tool that utilizes Java and other World Wide Web tools as an interface to Grid services to help Grid application developers debug their MPI programs from anywhere i...
Panayiotis Neophytou, Neophytos Neophytou, Paraske...