Sciweavers

1573 search results - page 168 / 315
» Strong User Authentication
Sort
View
USENIX
2003
15 years 3 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
ETT
2006
93views Education» more  ETT 2006»
15 years 1 months ago
A modular access gateway for managing intermittent connectivity in vehicular communications
The Drive-thru Internet architecture allows exploiting intermittent connectivity by temporarily connecting to IEEE 802.11 WLAN access points at the roadside from moving vehicles. T...
Jörg Ott, Dirk Kutscher
IJSN
2008
147views more  IJSN 2008»
15 years 1 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
ISI
2006
Springer
15 years 1 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
116
Voted
JCP
2006
86views more  JCP 2006»
15 years 1 months ago
MapWiki: A Map-based Content Sharing System for Distributed Location-dependent Information
Abstract-- In this paper, we propose a new map-based content sharing system 'MapWiki' for ubiquitous content distribution. In MapWiki, users can publish location-dependen...
Yuuichi Teranishi, Junzo Kamahara, Shinji Shimojo