Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Management Of Computing And Information Systems (K.6)
>
Security and Protection (K.6.5)
> Authentication (K.6.5...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 34 Reviews about "
Authentication (K.6.5...)
":
Date Reviewed
Advances in user authentication
Dasgupta D., Roy A., Nag A., Springer International Publishing, New York, NY, 2017. 360 pp. Type: Book (978-3-319588-06-3)
Authentication involves validating the authenticity of something or someone. This book is on advances in user authentication. It is authored by Dipankar Dasgupta, a faculty member at the University of Memphis, along with his former stu...
Feb 9 2018
Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N. UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii, Sep 11-15, 2017) 37-40, 2017. Type: Proceedings
Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under ...
Oct 5 2017
Analyzing proposals for improving authentication on the TLS-/SSL-protected Web
Brown C., Jenkins M. International Journal of Information Security 15(6): 621-635, 2016. Type: Article
Information and data flowing on the Internet are increasing by the day, and so is their importance. While standard protocols can still be appropriate for the casual browsing of the Web, they are absolutely inadequate when processing se...
Feb 27 2017
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
Hoang T., Choi D., Nguyen T. International Journal of Information Security 14(6): 549-560, 2015. Type: Article
Gait-based user authentication is a very well-known technique with ready adoption due to its nonobstructive method of operation. In this paper, Hoang et al. have proposed an inertial sensor-based approach for detecting human gait throu...
May 26 2016
Authentication in insecure environments: using visual cryptography and non-transferable credentials in practise
Pape S., Springer Vieweg, Wiesbaden, Germany, 2014. 362 pp. Type: Book (978-3-658071-15-8)
In the modern world, validating the authenticity of someone or something is an important security measure. Authentication in insecure environments is indeed a challenge. This book is based on the doctoral dissertation of Sebastian Pape...
Oct 7 2015
Authentication melee: a usability analysis of seven web authentication systems
Ruoti S., Roberts B., Seamons K. WWW 2015 (Proceedings of the 24th International World Wide Web Conference, Florence, Italy, May 18-22, 2015) 916-926, 2015. Type: Proceedings
Authentication systems must be strong enough to ensure confidentiality, accountability, and integrity for a reasonable cost--and be user friendly. Good, publicly available guidance does exist; for instance, see [1]. Usability,...
Jul 2 2015
An architecture for cross-cloud auditing
Xie R., Gamble R. CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Jan 8-10, 2013) 1-4, 2013. Type: Proceedings
Cloud computing enables on-demand, self-provisioned elastic computing. In addition to public cloud offerings, the private cloud has emerged on a wider scale and has been adopted by both the enterprise and public sectors. Several open-s...
Jul 19 2013
One-time cookies: preventing session hijacking attacks with stateless authentication tokens
Dacosta I., Chakradeo S., Ahamad M., Traynor P. ACM Transactions on Internet Technology 12(1): 1-24, 2012. Type: Article
The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of sessi...
Oct 8 2012
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
Wu S., Zhu Y., Pu Q. International Journal of Network Management 21(5): 384-401, 2011. Type: Article
There has been tremendous growth in low-power mobile wireless network devices in recent years. With that growth has come the need for a secure roaming authentication scheme for these devices, so that mobile users can seamlessly and sec...
Aug 23 2012
Protecting Web images from attacks to prove the real owner
Al-Nu’aimi A. ISWSA 2011 (Proceedings of the 2011 International Conference on Intelligent Semantic Web Services and Applications, Amman, Jordan, Apr 18-20, 2011) 1-5, 2011. Type: Proceedings
It is important to establish the ownership of images published over the Internet, and this paper proposes an adaptive algorithm based on the general nature of images. Convincing results show how owners can use a watermark that, on the ...
Jul 12 2011
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy