Sciweavers

1573 search results - page 75 / 315
» Strong User Authentication
Sort
View
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 3 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 3 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
PVLDB
2008
138views more  PVLDB 2008»
14 years 9 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
15 years 4 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
15 years 3 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto