Search For:

Displaying 1-3 out of 3 total
Remote Client Authentication
Found in: IEEE Security and Privacy
By Thomas Weigold, Thorsten Kramp, Michael Baentsch
Issue Date:July 2008
pp. 36-43
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each m...
JavaCard-From Hype to Reality
Found in: IEEE Concurrency
By Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Höring, Marcus Oestreicher
Issue Date:October 1999
pp. 36-43
In this final of three related articles about smart-card technology, the authors discuss the JavaCard, a much-hyped technology that is finally taking off as a multiapplication smart card.
Enhancing the Web's Infrastructure: From Caching to Replication
Found in: IEEE Internet Computing
By Michael Baentsch, Lothar Baum, Georg Molter, Steffen Rothkugel, Peter Sturm
Issue Date:March 1997
pp. 18-27
<p>Advances in directory services, caching and replication, and multicasting technologies promise to improve the speed and robustness of the Web's infrastructure. This article examines the technical issues of two important approaches—caching and repl...