• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 25
Next 10 →

Abstract Stronger Password Authentication Using Browser Extensions ∗

by Blake Ross, Dan Boneh
"... We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash function to a combination of the plaintext pas ..."
Abstract - Add to MetaCart
password entered by the user, data associated with the web site, and (optionally) a private salt stored on the client machine, theft of the password received at one site will not yield a password that is useful at another site. While the scheme requires no changes on the server side, implementing

Unreliable Network Re-Authentication Protocol Based on Hybrid Key Using CSP Approach

by Sureswaran Ramadass, Rahmat Budiarto, Ho Cheah Luan , 2007
"... Network security is becoming increasingly vital in today’s fast growing mobile computing environment. Due to constraints in device size and portability, limited processing power, small disk capacity, intermittent network disconnections and frequent switching between network access points have been o ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
channel. In this study, improved reauthentication scheme have been focused on, by performing comprehensive analysis to propose an enhanced authentication protocol which supports fast re-authentication for connection or disconnection of client-server system and other possibility of enhancement in terms

A Novel Cryptographic Key Distribution Scheme for Cloud Platforms

by Satpreet Kaur, Cgc Landran Mohali, Mandeep Singh, Cgc Landran Mohali
"... The problem of secure data transmission on cloud environments is addressed in the proposed security model. The data security is quite important on cloud environments because they belongs the users. The security layer is defined or implemented between the cloud user and server end to ensure the secur ..."
Abstract - Add to MetaCart
will develop the proposed scheme named EMCKS for corporate key management technique adaptable for the clouds by making it efficient and quicker. In addition, it also has to be improved to work with Cloud server and client nodes, which enforces the proposed scheme to create a secure environment based cloud

guidance of Prof. Raj Jain)

by A Survey Of Kerberos V, Public-key Kerberos
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract - Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos

Seamless Handover in WLAN and Cellular Networks through Intelligent Agents

by Li-der Chou, Wei-cheng Lai, Chen-han Lin, Yen-cheng Lin, Chin-min Huang
"... This paper presents an efficient method to support preauthentication for seamless handover and implement key distribution with EAP-SIM based AAA protocols for WLAN. Our goal is minimizing the probability of SIP calls blocking resulting from the handoff delay. The intelligent agents may play differen ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
different roles; it can acts as a client authenticating with the servers and moving data from and to mobile users, or alternatively a server collecting and moving data from and to authentication servers. The benefit of server intelligent agents maintaining user’s profile is user intelligent agents do

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a

Modelling and Simulation of a Biometric Identity- Based Cryptography

by Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen
"... Abstract—Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a ..."
Abstract - Add to MetaCart
we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality. Keywords—e-Government; identity-based cryptosystem; biometrics; mutual authentication; finite-state machine; Petri net. I.

Multi-file proofs of retrievability for cloud storage auditing

by Bin Wang A, Xiaojing Hong B
"... Abstract: Cloud storage allows clients to store a large amount of data with the help of storage service providers (SSPs). Proof-of-retrievability(POR) protocols allow one server to prove to a verifier the availability of data stored by some client. Shacham et al. presented POR protocols based on hom ..."
Abstract - Add to MetaCart
Abstract: Cloud storage allows clients to store a large amount of data with the help of storage service providers (SSPs). Proof-of-retrievability(POR) protocols allow one server to prove to a verifier the availability of data stored by some client. Shacham et al. presented POR protocols based

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
motivation. • Roberto Samarone Araujo for hours of discussing various protocols with Evengelos and me. • Warren D. Smith for providing with a preliminary version of his upcoming book »How Mathematics can Improve Democracy«. • Ute Günther and Christian Burgmann for their proof-reading. Nonetheless, any

Using BubbleStorm Accepted Master-Thesis from Marcel Lucas

by Assessor Prof Alej, Ro P. Buchmann, Ph. D
"... Hiermit versichere ich, die vorliegende Master-Thesis ohne Hilfe Dritter nur mit den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehö ..."
Abstract - Add to MetaCart
Prüfungsbehörde vorgelegen. Darmstadt, den 17. Mai 2011 (Marcel Lucas) The popularity of Networked Virtual Environments (NVE) increased remarkably in recent years where a plethora of players participate concurrently. Traditional approaches applying the Client/Server pattern swiftly reach their limit in terms
Next 10 →
Results 1 - 10 of 25
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University