Sciweavers

122 search results - page 12 / 25
» Authentication and Delegation with Smart-cards
Sort
View
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
13 years 11 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
AVBPA
2003
Springer
148views Biometrics» more  AVBPA 2003»
13 years 11 months ago
Scalability Analysis of Audio-Visual Person Identity Verification
In this work, we present a multimodal identity verification system based on the fusion of the face image and the text independent speech data of a person. The system conciliates th...
Jacek Czyz, Samy Bengio, Christine Marcel, Luc Van...
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
13 years 9 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
PR
2006
99views more  PR 2006»
13 years 7 months ago
Authenticating corrupted photo images based on noise parameter estimation
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
Sang-Woong Lee, Ho-Choul Jung, Bon-Woo Hwang, Seon...
EUROPKI
2004
Springer
14 years 28 days ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...