Sciweavers

1573 search results - page 164 / 315
» Strong User Authentication
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 9 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
105
Voted
PERCOM
2009
ACM
16 years 2 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
108
Voted
PERCOM
2005
ACM
16 years 1 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
PADL
2010
Springer
15 years 10 months ago
An ER-Based Framework for Declarative Web Programming
This paper describes a framework to support the implementation of web-based systems to manipulate data stored in relational databases. Since the conceptual model of a relational da...
Michael Hanus, Sven Koschnicke
112
Voted
ACSAC
2009
IEEE
15 years 8 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans