Sciweavers

1150 search results - page 76 / 230
» Beacon Based Authentication
Sort
View
NDSS
1997
IEEE
14 years 1 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 8 months ago
A Forward-Secure User Authentication Scheme with Smart Cards
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
Bin Wang, Zheng-Quan Li
CVPR
2012
IEEE
11 years 11 months ago
Keystroke dynamics for user authentication
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to key...
Yu Zhong, Yunbin Deng, Anil K. Jain
ICIP
2002
IEEE
14 years 10 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
OTM
2005
Springer
14 years 2 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...