Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5) > Authentication (K.6.5...)  
 
Options:
 
  1-10 of 34 Reviews about "Authentication (K.6.5...)": Date Reviewed
  Advances in user authentication
Dasgupta D., Roy A., Nag A., Springer International Publishing, New York, NY, 2017. 360 pp.  Type: Book (978-3-319588-06-3)

Authentication involves validating the authenticity of something or someone. This book is on advances in user authentication. It is authored by Dipankar Dasgupta, a faculty member at the University of Memphis, along with his former stu...

Feb 9 2018
  Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N.  UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii, Sep 11-15, 2017) 37-40, 2017.  Type: Proceedings

Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under ...

Oct 5 2017
  Analyzing proposals for improving authentication on the TLS-/SSL-protected Web
Brown C., Jenkins M. International Journal of Information Security 15(6): 621-635, 2016.  Type: Article

Information and data flowing on the Internet are increasing by the day, and so is their importance. While standard protocols can still be appropriate for the casual browsing of the Web, they are absolutely inadequate when processing se...

Feb 27 2017
  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
Hoang T., Choi D., Nguyen T. International Journal of Information Security 14(6): 549-560, 2015.  Type: Article

Gait-based user authentication is a very well-known technique with ready adoption due to its nonobstructive method of operation. In this paper, Hoang et al. have proposed an inertial sensor-based approach for detecting human gait throu...

May 26 2016
  Authentication in insecure environments: using visual cryptography and non-transferable credentials in practise
Pape S., Springer Vieweg, Wiesbaden, Germany, 2014. 362 pp.  Type: Book (978-3-658071-15-8)

In the modern world, validating the authenticity of someone or something is an important security measure. Authentication in insecure environments is indeed a challenge. This book is based on the doctoral dissertation of Sebastian Pape...

Oct 7 2015
  Authentication melee: a usability analysis of seven web authentication systems
Ruoti S., Roberts B., Seamons K.  WWW 2015 (Proceedings of the 24th International World Wide Web Conference, Florence, Italy, May 18-22, 2015) 916-926, 2015.  Type: Proceedings

Authentication systems must be strong enough to ensure confidentiality, accountability, and integrity for a reasonable cost--and be user friendly. Good, publicly available guidance does exist; for instance, see [1]. Usability,...

Jul 2 2015
  An architecture for cross-cloud auditing
Xie R., Gamble R.  CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Jan 8-10, 2013) 1-4, 2013.  Type: Proceedings

Cloud computing enables on-demand, self-provisioned elastic computing. In addition to public cloud offerings, the private cloud has emerged on a wider scale and has been adopted by both the enterprise and public sectors. Several open-s...

Jul 19 2013
   One-time cookies: preventing session hijacking attacks with stateless authentication tokens
Dacosta I., Chakradeo S., Ahamad M., Traynor P. ACM Transactions on Internet Technology 12(1): 1-24, 2012.  Type: Article

The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of sessi...

Oct 8 2012
  A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
Wu S., Zhu Y., Pu Q. International Journal of Network Management 21(5): 384-401, 2011.  Type: Article

There has been tremendous growth in low-power mobile wireless network devices in recent years. With that growth has come the need for a secure roaming authentication scheme for these devices, so that mobile users can seamlessly and sec...

Aug 23 2012
  Protecting Web images from attacks to prove the real owner
Al-Nu’aimi A.  ISWSA 2011 (Proceedings of the 2011 International Conference on Intelligent Semantic Web Services and Applications, Amman, Jordan, Apr 18-20, 2011) 1-5, 2011.  Type: Proceedings

It is important to establish the ownership of images published over the Internet, and this paper proposes an adaptive algorithm based on the general nature of images. Convincing results show how owners can use a watermark that, on the ...

Jul 12 2011
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy