Sciweavers

79 search results - page 13 / 16
» A Biometric Identity Based Signature Scheme
Sort
View
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 5 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
APNOMS
2007
Springer
14 years 5 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
AINA
2006
IEEE
14 years 5 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
ICB
2009
Springer
158views Biometrics» more  ICB 2009»
13 years 8 months ago
3D Face Recognition Using Joint Differential Invariants
Stemming from a sound mathematical framework dating back to the beginning of the 20th century, this paper introduces a novel approach for 3D face recognition. The proposed techniqu...
Marinella Cadoni, Manuele Bicego, Enrico Grosso
ICCSA
2005
Springer
14 years 4 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das