Results 1 - 10
of
53,717
Table 1 Survey of Smart Card Certifications.
"... In PAGE 9: ...1. EXPLANATION OF TABLE HEADINGS The column, Resists Attack Potential in Table1 requires some ex- planation. For ITSEC certifications it refers to the claimed minimum strength of mechanisms (SoM).... ..."
Cited by 1
Table 4: The di erence in single-keyword read query response time between the lock-based and timestamp-based implementations of the Batch approach when an insert of a document of di erent size proceeds simultaneously.
1998
Cited by 16
Table 1: Summary of software-assisted cache coherence schemes.
"... In PAGE 6: ...ill brie y compare these two schemes at the end of Section 4.3. For completeness purposes, we mention Smith apos;s one time identi er scheme [33] which is more geared towards the caching of variables in critical sections. Table1 shows a summary of the software-assisted cache coherence schemes discussed in this section. 4 Timestamp-based cache coherence scheme 4.... ..."
TABLE II COST PER USER EQUIPMENT [KEUR] FOR THE SMART AND OPPORTUNISTIC SCHEMES.
Table 1 Cell I: Smart Card Payment Schemes Driven by Financial Institutions Name Description
2005
Cited by 3
Table 2: Improvement in the ratio of number of packets lost to number of packets sent for various ^ h, ,
1998
"... In PAGE 9: ... For simulation purposes we used a random number to simulate a signal fading situation.As the IS-136 scheme allows only one user per slot, the values of pl used in our experiments is same as the packet loss probability ( Table2 ) incurred using the IS- 136 scheme. In real life, however, it is di cult to predict the packet loss probability.... In PAGE 10: ... For a fair comparison on the number of packets lost in IS-136 with our scheme, we actually compare the number of packets lost for each user. Thus, OSloss in Table2 are scaled to re ect the number of packets lost for each user. Instead of wasting the whole slot band- width for retransmitting the previous lost packet, the concept of retransmission minislots improves the sys- tem performance tremendously.... ..."
Cited by 3
Table 5: Authentication Methods for authentication service
"... In PAGE 2: ... For task minimum authentication security level required is 0.2 and this is compared with security level and corresponding overhead given in Table5 . Incase security requirement does not directly match with table value next higher security level is being considered.... In PAGE 5: ... The authentication service insured that all task must be submitted by authorized users. Three authentication methods are used in paper which is shown in Table5 where each authentication method is assigned a security level value. Security level of a required authentication method (other than given in table 4) can be calculated using equation 5.... In PAGE 9: ... These results are shown in the table 5. Table5 : Feasibility analysis after improvement phase with modified approach Task Authentication overhead(security value) Confidentiality overhead(security value) Integrity overhead(security value) Finish time ( +Overhead+ wi ) Deadli ne 90(0.2) 5.... ..."
Table 5. Authentication Protocol Types
2004
"... In PAGE 49: ...n section 8.1.2 above. Table 4 summarizes the requirements for the resistance of passwords to on-line password guessing attacks. Table5 identifies the types of authentication protocols that are applicable to each assurance level. Table 6 identifies ... ..."
Table 1: Comparison of various authentication methods
2001
"... In PAGE 3: ... Different kinds of authentication tokens are available, from Smart Card and USB tokens, to biometric devices, challenge-response cards and software tokens (as the internal security databases of Netscape and Microsoft software products). Table1 compares the various authentication methods according to several variables, where higher scores mean better characteristics [8]. Table 1: Comparison of various authentication methods ... ..."
Cited by 1
Results 1 - 10
of
53,717