Sciweavers

134 search results - page 14 / 27
» Authentic Third-party Data Publication
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 2 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
NSPW
2003
ACM
14 years 21 days ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
AMI
2008
Springer
13 years 9 months ago
Analysis of Heart Stress Response for a Public Talk Assistant System
Conference presentations are stressful communication tasks for many speakers. This mental stress inhibits the speaker's ability to recall information and perceive the audience...
Martin Kusserow, Oliver Amft, Gerhard Tröster