Sciweavers

1573 search results - page 128 / 315
» Strong User Authentication
Sort
View
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 7 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 1 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
NORDICHI
2004
ACM
15 years 7 months ago
Active co-construction of meaningful experiences: but what is the designer's role?
This talk discusses how to strike a good balance between making the user an active co-constructor of system functionality versus making a too strong, interpretative design that do...
Kristina Höök
EUROCRYPT
2007
Springer
15 years 8 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya
137
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 6 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt