Sciweavers

1150 search results - page 140 / 230
» Beacon Based Authentication
Sort
View
TNC
2004
103views Education» more  TNC 2004»
13 years 10 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
ESORICS
2010
Springer
13 years 10 months ago
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
PR
2008
137views more  PR 2008»
13 years 8 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
FGCS
2010
99views more  FGCS 2010»
13 years 7 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
ICIP
2003
IEEE
14 years 10 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran