Sciweavers

1365 search results - page 26 / 273
» Simple authentication for the web
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
A Simple Model and Infrastructure for Context-Aware Browsing of the World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
DOCENG
2006
ACM
15 years 3 months ago
Solving the simple continuous table layout problem
Automatic table layout is required in web applications. Unfortunately, this is NP-hard for reasonable layout requirements such as minimizing table height for a given width. One ap...
Nathan Hurst, Kim Marriott, David W. Albrecht
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 3 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
ESORICS
2000
Springer
15 years 1 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
86
Voted
ISW
2000
Springer
15 years 1 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson