Sciweavers

1150 search results - page 31 / 230
» Beacon Based Authentication
Sort
View
ISCC
2002
IEEE
110views Communications» more  ISCC 2002»
14 years 14 days ago
Authenticating real time packet streams and multicasts
In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are si...
Alain Pannetrat, Refik Molva
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
13 years 11 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 7 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
DCC
2010
IEEE
13 years 7 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
JCP
2007
88views more  JCP 2007»
13 years 7 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet