Sciweavers

1573 search results - page 126 / 315
» Strong User Authentication
Sort
View
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 7 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
IWC
2008
67views more  IWC 2008»
15 years 1 months ago
Humour, Relationship Maintenance and Personality Matching in automated dialogue: A controlled study
We built an automated dialogue system whose style of interaction can be varied along the three dimensions of Humour, Relationship Maintenance and Personality Matching. We then ran...
Marco De Boni, Alannah Richardson, Robert Hurling
110
Voted
HPDC
2002
IEEE
15 years 6 months ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
LISA
2000
15 years 3 months ago
Pelendur: Steward of the Sysadmin
Here we describe Pelendur, a system for the management of common system operation tasks. Specifically, Pelendur focuses on the management of user accounts and related information ...
Matt Curtin, Sandy Farrar, Tami King
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 5 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...