Strengthen user authentication on mobile devices by using user's touch dynamics pattern. | 0 | 0.34 | 2020 |
Sensing Your Touch: Strengthen User Authentication Via Touch Dynamic Biometrics | 0 | 0.34 | 2019 |
Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks. | 1 | 0.35 | 2017 |
Mobile Cloud Computing: Security Analysis | 0 | 0.34 | 2017 |
Towards a Virtual Domain Based Authentication on MapReduce. | 0 | 0.34 | 2016 |
Challenges and opportunities in next-generation cyberspace security | 0 | 0.34 | 2016 |
An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs. | 3 | 0.37 | 2016 |
Tdas: A Touch Dynamics Based Multi-Factor Authentication Solution For Mobile Devices | 6 | 0.64 | 2016 |
A survey on touch dynamics authentication in mobile devices. | 21 | 0.80 | 2016 |
Impact of hash value truncation on ID anonymity in Wireless Sensor Networks. | 2 | 0.37 | 2016 |
TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs | 1 | 0.36 | 2015 |
Access Control Models for Pervasive Environments: A Survey. | 1 | 0.38 | 2015 |
Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration. | 5 | 0.45 | 2015 |
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs | 1 | 0.38 | 2015 |
MapReduce: MR Model Abstraction for Future Security Study | 3 | 0.57 | 2014 |
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context | 0 | 0.34 | 2014 |
A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments | 2 | 0.40 | 2012 |
Quantifying authentication Levels of Assurance in grid environments. | 1 | 0.41 | 2010 |
Achieving Fine-Grained Access Control In Virtual Organizations | 5 | 0.78 | 2007 |
Levels of Authentication Assurance: an Investigation | 5 | 0.84 | 2007 |
A Purpose-Based Access Control Model | 20 | 1.45 | 2007 |
Compact access control labeling for efficient secure XML query evaluation | 13 | 0.62 | 2007 |
Secure M-commerce Transactions: A Third Party Based Signature Protocol | 3 | 0.44 | 2007 |
A mobility monitoring based advance reservation protocol | 2 | 0.47 | 2006 |
FIX: feature-based indexing technique for XML documents | 21 | 0.89 | 2006 |
XSEED: Accurate and Fast Cardinality Estimation for XPath Queries | 37 | 1.13 | 2006 |
FAME: Adding Multi-Level Authentication to Shibboleth | 4 | 0.55 | 2006 |
InterJoin: Exploiting Indexes and Materialized Views in XPath Evaluation | 7 | 0.44 | 2006 |
Statistical learning techniques for costing XML queries | 42 | 1.72 | 2005 |
BlossomTree: Evaluating XPaths in FLWOR Expressions | 2 | 0.39 | 2005 |
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption | 5 | 0.58 | 2005 |
Certified E-Mail Delivery with DSA Receipts | 2 | 0.35 | 2005 |
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery | 2 | 0.37 | 2005 |
A Security Protocol for Certified E-Goods Delivery | 9 | 0.59 | 2004 |
A succinct physical storage scheme for efficient evaluation of path queries in XML | 59 | 1.98 | 2004 |
A secure method for signature delegation to mobile agents | 6 | 0.55 | 2004 |
Autonomous mobile agent based fair exchange | 2 | 0.37 | 2004 |
Fair certified e-mail delivery | 18 | 0.76 | 2004 |
A new signature scheme: joint-signature | 9 | 0.86 | 2004 |
Prediction of PTZ-induced seizures using wavelet-based residual entropy of cortical and subcortical field potentials | 4 | 0.53 | 2003 |
Towards a Secure Mobile Agent Based M-Commerce System | 0 | 0.34 | 2003 |
Non-Repudiation and Fairness in Electronic Data Exchange | 1 | 0.37 | 2003 |
An Asymmetric Authentication Protocol for M-Commerce Applications | 4 | 0.60 | 2003 |
Finding shortest paths in large network systems | 19 | 1.28 | 2001 |
A Flexible Approach to Secure and Fair Document Exchange | 2 | 0.38 | 1999 |
Study On Adaptive Job Assignment For Multiprocessor Implementation Of Mpeg2 Video Encoding | 5 | 0.70 | 1997 |
Achieving Non-Repudiation Of Receipt | 29 | 1.42 | 1996 |