Sciweavers

1150 search results - page 115 / 230
» Beacon Based Authentication
Sort
View
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
13 years 8 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
PERCOM
2007
ACM
14 years 8 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
IEEEIAS
2009
IEEE
14 years 3 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
ACSAC
2006
IEEE
14 years 3 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
14 years 2 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...