Sciweavers

1150 search results - page 70 / 230
» Beacon Based Authentication
Sort
View
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 1 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
VIP
2001
13 years 10 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
JCP
2006
100views more  JCP 2006»
13 years 8 months ago
Biometric Gait Authentication Using Accelerometer Sensor
Abstract-- This paper presents a biometric user authentication based on a person's gait. Unlike most previous gait recognition approaches, which are based on machine vision te...
Davrondzhon Gafurov, Kirsi Helkala, Torkjel S&osla...
MASS
2010
118views Communications» more  MASS 2010»
13 years 6 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
ICMLA
2009
14 years 5 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa