Sciweavers

1150 search results - page 67 / 230
» Beacon Based Authentication
Sort
View
95
Voted
ICPR
2006
IEEE
16 years 3 months ago
Motion Features from Lip Movement for Person Authentication
This paper describes a new motion based feature extraction technique for speaker identification using orientation estimation in 2D manifolds. The motion is estimated by computing ...
Josef Bigün, Maycel Isaac Faraj
IEEEMSP
2002
IEEE
129views Multimedia» more  IEEEMSP 2002»
15 years 7 months ago
Embedded signature-based authentication by channel statistics using watermarking techniques
This study examines the feasibility of using channel statistics to perform embedded signature-based authentication. Doing so is an attempt to view a reference watermark embedded w...
Zhi-Fang Yang, Wen-Hsiang Tsai
145
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 6 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
CCS
2008
ACM
15 years 4 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
109
Voted
INFOCOM
2010
IEEE
15 years 26 days ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...