Sciweavers

1573 search results - page 136 / 315
» Strong User Authentication
Sort
View
88
Voted
CHI
2007
ACM
16 years 2 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ACSAC
2008
IEEE
15 years 8 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
114
Voted
ICB
2007
Springer
184views Biometrics» more  ICB 2007»
15 years 8 months ago
Biometric Template Classification: A Case Study in Iris Textures
Most of the biometric authentication systems store multiple templates per user to account for variations in biometric data. Therefore, these systems suffer from storage space and ...
Edara Srinivasa Reddy, Chinnam SubbaRao, Inampudi ...
BROADNETS
2005
IEEE
15 years 7 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
97
Voted
ITCC
2005
IEEE
15 years 7 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...