Sciweavers

1573 search results - page 139 / 315
» Strong User Authentication
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 1 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
PC
1998
125views Management» more  PC 1998»
15 years 1 months ago
A High-Performance Active Digital Library
We describe Javaflow and Paraflow, the client and server parts of a digital library, providing high-performance data-retrieval and data-mining services, with emphasis on user in...
Roy Williams, Bruce Sears
GLOBECOM
2010
IEEE
14 years 12 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
114
Voted
AUIC
2004
IEEE
15 years 5 months ago
Revisiting 2D vs 3D Implications on Spatial Memory
Prior research has shown that the efficient use of graphical user interfaces strongly depends on human capabilities for spatial cognition. Although it is tempting to believe that ...
Andy Cockburn
LISA
2003
15 years 3 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis