Sciweavers

1573 search results - page 172 / 315
» Strong User Authentication
Sort
View
MM
2010
ACM
182views Multimedia» more  MM 2010»
15 years 2 months ago
A 3d data intensive tele-immersive grid
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
133
Voted
WMASH
2004
ACM
15 years 7 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
121
Voted
DIM
2005
ACM
15 years 3 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
118
Voted
ESORICS
2008
Springer
15 years 3 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 1 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu