Sciweavers

1573 search results - page 63 / 315
» Strong User Authentication
Sort
View
ICOIN
2007
Springer
15 years 4 months ago
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
 Mobile IP (MIP) has been paid a lot of attention as a good candidate  to provide such global mobility among heterogeneous networks.  And, IPv6  incorporat...
Jun-Won Lee, Sang-Won Min, Byung K. Choi
ICISS
2007
Springer
15 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
AAAI
2007
15 years 4 days ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
68
Voted
USENIX
2007
15 years 4 days ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah
ICVGIP
2008
14 years 11 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi