Sciweavers

1150 search results - page 118 / 230
» Beacon Based Authentication
Sort
View
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
ITCC
2005
IEEE
14 years 2 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan
WS
2004
ACM
14 years 2 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
RAID
2005
Springer
14 years 2 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ICIP
1999
IEEE
14 years 10 months ago
Deformable Matching of Hand Shapes for User Verification
Wepresent a method for personal authentication based on deformable matching of hand shapes. Authentication systems are already employed in domains that require some sort of user v...
Anil K. Jain, Nicolae Duta