Sciweavers

1150 search results - page 46 / 230
» Beacon Based Authentication
Sort
View
ACISP
2010
Springer
13 years 9 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
JOC
2006
116views more  JOC 2006»
13 years 7 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
ICPR
2000
IEEE
14 years 8 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
DCC
2005
IEEE
14 years 7 months ago
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity
A certificate of authenticity (COA) is an inexpensive physical object that has a random unique structure with high cost of near-exact reproduction. An additional requirement is th...
Darko Kirovski
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
14 years 2 months ago
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...