Sciweavers

1150 search results - page 73 / 230
» Beacon Based Authentication
Sort
View
ICIP
2002
IEEE
14 years 10 months ago
Multimedia content authentication: fundamental limits
In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
Emin Martinian, Gregory W. Wornell
FC
2001
Springer
94views Cryptology» more  FC 2001»
14 years 1 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
CSREASAM
2006
13 years 10 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
AINA
2004
IEEE
14 years 19 days ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
JEI
2008
135views more  JEI 2008»
13 years 8 months ago
Face authentication using a hybrid approach
This paper presents a hybrid approach to face-feature extraction based on the trace transform and the novel kernel partial-least-squares discriminant analysis (KPA). The hybrid app...
Vitomir Struc, France Mihelic, Nikola Pavesic