Sciweavers

1150 search results - page 137 / 230
» Beacon Based Authentication
Sort
View
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
ICIP
2003
IEEE
14 years 10 months ago
Graphical indicia
We present an authenticable graphical barcode symbology, and describe a system for its reliable encoding and decoding. The graphical barcode is generated by modulating halftone pa...
Doron Shaked, Zachi Baharav, Avi Levy, Jonathan Ye...
ICICS
1997
Springer
14 years 13 days ago
Secure document management and distribution in an open network environment
Abstract. This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document integrity, origi...
Antonio Lioy, Fabio Maino, Marco Mezzalama
ICISC
1998
99views Cryptology» more  ICISC 1998»
13 years 10 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
INFOCOM
2009
IEEE
14 years 3 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu