Sciweavers

1150 search results - page 141 / 230
» Beacon Based Authentication
Sort
View
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ESAS
2007
Springer
14 years 3 months ago
Private Handshakes
—Nowadays, users are increasingly concerned about individual privacy in cyberspace and Internet. In this paper, we propose the concept of private handshakes with optional account...
Jaap-Henk Hoepman
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 2 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 22 days ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi