• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 53,717
Next 10 →

Table 1 Survey of Smart Card Certifications.

in Making Sense Of Smart Card Security Certifications
by Jason Reid, Mark Looi
"... In PAGE 9: ...1. EXPLANATION OF TABLE HEADINGS The column, Resists Attack Potential in Table1 requires some ex- planation. For ITSEC certifications it refers to the claimed minimum strength of mechanisms (SoM).... ..."
Cited by 1

TABLE A2 . Comparison of Authentication Technologies

in unknown title
by unknown authors 2001

Table 4: The di erence in single-keyword read query response time between the lock-based and timestamp-based implementations of the Batch approach when an insert of a document of di erent size proceeds simultaneously.

in Efficient Real-Time Index Updates in Text Retrieval Systems
by Tzi-cker Chiueh, Lan Huang 1998
Cited by 16

Table 1: Summary of software-assisted cache coherence schemes.

in Design and Analysis of a Scalable Cache Coherence Scheme based on Clocks and Timestamps
by S. L. Min, J.-L. Baer
"... In PAGE 6: ...ill brie y compare these two schemes at the end of Section 4.3. For completeness purposes, we mention Smith apos;s one time identi er scheme [33] which is more geared towards the caching of variables in critical sections. Table1 shows a summary of the software-assisted cache coherence schemes discussed in this section. 4 Timestamp-based cache coherence scheme 4.... ..."

TABLE II COST PER USER EQUIPMENT [KEUR] FOR THE SMART AND OPPORTUNISTIC SCHEMES.

in Comparison and Cost Analysis of Smart and Opportunistic MIMO OFDM Schemes
by Mats Bengtsson, Patrick Svedman, Per Zetterberg

Table 1 Cell I: Smart Card Payment Schemes Driven by Financial Institutions Name Description

in Towards A Holistic Analysis of Mobile Payments: A Multiple Perspectives Approach
by Jan Ondrus, Yves Pigneur 2005
Cited by 3

Table 2: Improvement in the ratio of number of packets lost to number of packets sent for various ^ h, ,

in A Framework for Call Admission control in Next Generation Wireless Networks
by Naveen Kakani And, Naveen K. Kakani, Sajal K. Das, Sanjoy K. Sen 1998
"... In PAGE 9: ... For simulation purposes we used a random number to simulate a signal fading situation.As the IS-136 scheme allows only one user per slot, the values of pl used in our experiments is same as the packet loss probability ( Table2 ) incurred using the IS- 136 scheme. In real life, however, it is di cult to predict the packet loss probability.... In PAGE 10: ... For a fair comparison on the number of packets lost in IS-136 with our scheme, we actually compare the number of packets lost for each user. Thus, OSloss in Table2 are scaled to re ect the number of packets lost for each user. Instead of wasting the whole slot band- width for retransmitting the previous lost packet, the concept of retransmission minislots improves the sys- tem performance tremendously.... ..."
Cited by 3

Table 5: Authentication Methods for authentication service

in MODIFIED APPROACH FOR SECURING REAL TIME APPLICATION ON CLUSTERS
by Abhishek Songra, Rama Shankar Yadad, Sarsij Tripathi, Abhishek Songra, Rama Shankar Yadav, Sarsij Tripathi
"... In PAGE 2: ... For task minimum authentication security level required is 0.2 and this is compared with security level and corresponding overhead given in Table5 . Incase security requirement does not directly match with table value next higher security level is being considered.... In PAGE 5: ... The authentication service insured that all task must be submitted by authorized users. Three authentication methods are used in paper which is shown in Table5 where each authentication method is assigned a security level value. Security level of a required authentication method (other than given in table 4) can be calculated using equation 5.... In PAGE 9: ... These results are shown in the table 5. Table5 : Feasibility analysis after improvement phase with modified approach Task Authentication overhead(security value) Confidentiality overhead(security value) Integrity overhead(security value) Finish time ( +Overhead+ wi ) Deadli ne 90(0.2) 5.... ..."

Table 5. Authentication Protocol Types

in unknown title
by unknown authors 2004
"... In PAGE 49: ...n section 8.1.2 above. Table 4 summarizes the requirements for the resistance of passwords to on-line password guessing attacks. Table5 identifies the types of authentication protocols that are applicable to each assurance level. Table 6 identifies ... ..."

Table 1: Comparison of various authentication methods

in Medical Data Protection with a New Generation of Hardware Authentication Tokens', Idem
by S. Bergamasco, M. Bon, P. Inchingolo 2001
"... In PAGE 3: ... Different kinds of authentication tokens are available, from Smart Card and USB tokens, to biometric devices, challenge-response cards and software tokens (as the internal security databases of Netscape and Microsoft software products). Table1 compares the various authentication methods according to several variables, where higher scores mean better characteristics [8]. Table 1: Comparison of various authentication methods ... ..."
Cited by 1
Next 10 →
Results 1 - 10 of 53,717
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University