• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 65
Next 10 →

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers

by Mohammad Mannan, P. C. van Oorschot , 2008
"... Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, d ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions

Commercialization of the Internet: The Interaction of Public Policy and Private Actions,” in

by Shane Greenstein , Angelique Augereau , Oded Bizan , Tim Bresnahan , Barbara Dooley , Chris Forman , Amy Friedlander , Avi Goldfarb , Brian Kahin , Mort Rahimi , Scott Stern , Mitchell Waldrop - Editors), Innovation, Policy and the , 2001
"... seminar participants for comments. I am particularly grateful to Zvi Griliches who encouraged this research when it was at a formative stage. All remaining errors are mine alone. Abstract Why did commercialization of the Internet go so well? This paper examines events in the Internet access market ..."
Abstract - Cited by 20 (10 self) - Add to MetaCart
it for a fee and develop related applications as users require. While sometimes this is all they do, with business users they often do much more. Sometimes ISPs do simple things such as filtering. Sometimes it involves managing and designing email accounts, data-bases and web pages. Some ISPs label

Authentic game-based learning and teachers' dilemmas in reconstructing professional practice

by Y S Chee , S Mehrotra , J C Ong
"... Teachers who attempt pedagogical innovation with authentic digital games face significant challenges because such games instantiate open systems of learner activity, inviting inquiry learning rather than knowledge acquisition. However, school environments are normatively sanctioned cultural spaces ..."
Abstract - Add to MetaCart
. A school culture that cultivates innovative practice based on greater teacher agency is needed for authentic game-based learning to find traction in the classroom. Keywords: dialogue; game-based learning; professional practice; teacher dilemmas Introduction Interest in the use of digital games

Human Trust Establishment

by Michael Farb, Manish Burman, Gurtej Singh Ch, Jon Mccune, Adrian Perrig, Michael Farb, Manish Burman, Gurtej Singh, Chandok Jon, Mccune Adrian Perrig , 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract - Add to MetaCart
the desperation of users. To establish a secure basis for Internet communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. Through the exchanged authentic public key, SafeSlinger establishes a secure channel

guidance of Prof. Raj Jain)

by A Survey Of Kerberos V, Public-key Kerberos
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract - Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos

Has the ice man arrived? Tact on the Internet

by Jonathan Grudin
"... Several years ago at Bellcore, researchers thought it would be great to access newsgroup contributions by people they admired. They wrote a program to archive and search newsgroups. They tested it by entering the names of a few colleagues. "We soon found," one recounted, "that we wer ..."
Abstract - Add to MetaCart
were discovering things about our friends that we didn't want to know." The Internet has created a new focus of computation: computer-mediated communication and interaction. Most of what is communicated is received indirectly. On the Web, above all else we see what people produce and make

IEEE Communications Magazine • April 200054 QoS-Enabled Voice Support in the Next-Generation Internet: Issues, Existing Approaches and Challenges

by unknown authors
"... The Internet is under rapid growth and con-tinuous evolution in order to accommodate an increasingly large number of applications with diverse service requirements. In particular, Internet telephony, or voice over IP is one of the most promising services currently being deployed. Besides the potenti ..."
Abstract - Add to MetaCart
-tectures and associated protocols for managing calls, a security mechanism for user authentica-tion, and proper charging schemes. The most prominent one, however, is how to ensure the QoS needed for voice conversation. The pur-pose of this article is to survey the state-of-the-art technologies in enabling the QoS support

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

Thesis Advisor Accepted by.......Gakenhimer..

by Gregory A. Rossel, Fiichael J. Shiffer, Ralph Gakenheimer, Gregory A. Rossel
"... ussRaNIte ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 65
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University