Sciweavers

1573 search results - page 169 / 315
» Strong User Authentication
Sort
View
105
Voted
JSAC
2006
139views more  JSAC 2006»
15 years 1 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
ECR
2002
160views more  ECR 2002»
15 years 1 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
IFIP
2009
Springer
14 years 11 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 5 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
102
Voted
SAINT
2007
IEEE
15 years 8 months ago
Nazca: A Geographic Location Service
With the great expansion of advanced wireless technologies, users can now conveniently access the Internet from almost anywhere. We consider geographic information to be an import...
Mio Suzuki, Teruaki Yokoyama, Takuji Iimura, Shige...