Sciweavers

1150 search results - page 64 / 230
» Beacon Based Authentication
Sort
View
CTRSA
2008
Springer
172views Cryptology» more  CTRSA 2008»
13 years 10 months ago
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes. Our schemes have a security proof in the standard model, yet they offer performan...
Eike Kiltz, Yevgeniy Vahlis
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 3 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 3 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
HUC
2009
Springer
14 years 1 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
PAMI
2007
97views more  PAMI 2007»
13 years 8 months ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell