Sciweavers

1150 search results - page 176 / 230
» Beacon Based Authentication
Sort
View
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Aggregating signatures of MPEG-4 elementary streams
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Yongdong Wu
MM
2005
ACM
114views Multimedia» more  MM 2005»
14 years 2 months ago
IMAGINATION: a robust image-based CAPTCHA generation system
We propose IMAGINATION (IMAge Generation for INternet AuthenticaTION), a system for the generation of attack-resistant, user-friendly, image-based CAPTCHAs. In our system, we prod...
Ritendra Datta, Jia Li, James Ze Wang
CONCUR
2005
Springer
14 years 2 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
ICN
2005
Springer
14 years 2 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
14 years 2 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud