Authentication is a key security control for any computing system, whether that is a PC, server, laptop, tablet or mobile phone. However, authentication is traditionally poorly served, with existing implementations falling foul of a variety of weaknesses. Passwords are poorly selected, reused and shared (to name but a few). Research has suggested novel approaches to authentication such as transparent authentication and cooperative and distributed authentication. However, these technologies merely focus upon individual platforms rather than providing a universal and federated authentication approach that can be used across technologies and services. The advent of cloud computing, its universal connectivity, scalability and flexibility, offer...
Information systems are used in overt and covert conflict and information operations target an oppon...
Epilepsy is a neurological disorder that affects 50 million people worldwide. It is characterised by...
Discussions and enquiries concerning open access journals and the best way to support the associated...
Authentication is a key security control for any computing system, whether that is a PC, server, lap...
International audienceAs the Internet users increase, the need to protect web servers from malicious...
Information systems are used in overt and covert conflict and information operations target an oppon...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
Records management practices are mandatory in many business and government operations. Records manag...
The term security assurance has been used in the computer science literature to express the confiden...
Identity and identification are linked by variable meanings and applications and are essential in ma...
The ActiveSync protocol\u27s implementation on some embedded devices leaves clients vulnerable to un...
Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intrud...
Of the many notebook computers which are stolen, a large number are subsequently recovered. However,...
This paper describes a user study that investigated to what extent the display of Bluetooth presence...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Information systems are used in overt and covert conflict and information operations target an oppon...
Epilepsy is a neurological disorder that affects 50 million people worldwide. It is characterised by...
Discussions and enquiries concerning open access journals and the best way to support the associated...
Authentication is a key security control for any computing system, whether that is a PC, server, lap...
International audienceAs the Internet users increase, the need to protect web servers from malicious...
Information systems are used in overt and covert conflict and information operations target an oppon...
The process of validating the correct operation of software is difficult for a variety of reasons. T...
Records management practices are mandatory in many business and government operations. Records manag...
The term security assurance has been used in the computer science literature to express the confiden...
Identity and identification are linked by variable meanings and applications and are essential in ma...
The ActiveSync protocol\u27s implementation on some embedded devices leaves clients vulnerable to un...
Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intrud...
Of the many notebook computers which are stolen, a large number are subsequently recovered. However,...
This paper describes a user study that investigated to what extent the display of Bluetooth presence...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Information systems are used in overt and covert conflict and information operations target an oppon...
Epilepsy is a neurological disorder that affects 50 million people worldwide. It is characterised by...
Discussions and enquiries concerning open access journals and the best way to support the associated...