Sciweavers

1150 search results - page 124 / 230
» Beacon Based Authentication
Sort
View
NBIS
2009
Springer
14 years 3 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
ICIAP
2007
ACM
14 years 3 months ago
Dynamic Score Selection for Fusion of Multiple Biometric Matchers
A biometric system for user authentication produces a matching score representing the degree of similarity of the input biometry with the set of templates for that user. If the sc...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
AICT
2006
IEEE
126views Communications» more  AICT 2006»
14 years 3 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood
INDOCRYPT
2004
Springer
14 years 2 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
ISHPC
1999
Springer
14 years 1 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson