Sciweavers

1150 search results - page 67 / 230
» Beacon Based Authentication
Sort
View
ICPR
2006
IEEE
14 years 10 months ago
Motion Features from Lip Movement for Person Authentication
This paper describes a new motion based feature extraction technique for speaker identification using orientation estimation in 2D manifolds. The motion is estimated by computing ...
Josef Bigün, Maycel Isaac Faraj
IEEEMSP
2002
IEEE
129views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Embedded signature-based authentication by channel statistics using watermarking techniques
This study examines the feasibility of using channel statistics to perform embedded signature-based authentication. Doing so is an attempt to view a reference watermark embedded w...
Zhi-Fang Yang, Wen-Hsiang Tsai
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 22 days ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
CCS
2008
ACM
13 years 10 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
INFOCOM
2010
IEEE
13 years 7 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...