Sciweavers

1573 search results - page 190 / 315
» Strong User Authentication
Sort
View
CORR
2010
Springer
67views Education» more  CORR 2010»
15 years 1 months ago
Profile Popularity in a Business-oriented Online Social Network
Abstract--Analysing Online Social Networks (OSN), voluntarily maintained and automatically exploitable databases of electronic personal information, promises a wealth of insight in...
Thorsten Strufe
TWC
2008
105views more  TWC 2008»
15 years 1 months ago
An EM approach to multiple-access interference mitigation in asynchronous slow FHSS systems
In this paper, we apply the EM algorithm for mitigation of multi-access interference (MAI) in asynchronous slow frequency-hop spread spectrum (FHSS) systems that employ binary freq...
Xing Tan, John M. Shea
144
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ICS
2003
Tsinghua U.
15 years 7 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
111
Voted
CCS
2009
ACM
15 years 6 months ago
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering mult...
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P...