Sciweavers

1150 search results - page 28 / 230
» Beacon Based Authentication
Sort
View
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 7 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
MOBICOM
2006
ACM
14 years 1 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
NDSS
1999
IEEE
13 years 11 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
BIOID
2008
130views Biometrics» more  BIOID 2008»
13 years 9 months ago
Quality-Based Score Normalization and Frame Selection for Video-Based Person Authentication
This paper addresses the incorporation of quality measures to video-based person authentication. A theoretical framework to incorporate quality measures in biometric authentication...
Enrique Argones-Rúa, José Luis Alba-...