Sciweavers

1573 search results - page 85 / 315
» Strong User Authentication
Sort
View
75
Voted
ACSAC
2005
IEEE
15 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
DSN
2007
IEEE
15 years 4 months ago
User Discrimination through Structured Writing on PDAs
This paper explores whether features of structured writing can serve to discriminate users of handheld devices such as Palm PDAs. Biometric authentication would obviate the need t...
Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Kill...
ICDCS
2005
IEEE
15 years 3 months ago
Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users
Heterogeneous users usually have different requirements as far as consistency of shared data is concerned. This paper proposes and investigates a mixed consistency model to meet t...
Zhiyuan Zhan, Mustaque Ahamad, Michel Raynal
MOBICOM
2004
ACM
15 years 3 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang