Sciweavers

1150 search results - page 43 / 230
» Beacon Based Authentication
Sort
View
29
Voted
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
CCS
2009
ACM
14 years 8 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
ICDS
2010
IEEE
14 years 2 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
ACSAC
2008
IEEE
14 years 2 months ago
pwdArmor: Protecting Conventional Password-Based Authentications
pwdArmor is a framework for fortifying conventional password-based authentications. Many password protocols are performed within an encrypted tunnel (e.g., TLS) to prevent the exp...
Timothy W. van der Horst, Kent E. Seamons
ICPR
2010
IEEE
13 years 5 months ago
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric Authentication
This paper proposes a novel robust watermarking scheme to embed fingerprint minutiae into face images for multimodal biometric authentication. First, a block pyramid is layered ac...
Bin Ma, ChunLei Li, Yunhong Wang, Zhaoxiang Zhang,...