Sciweavers

1150 search results - page 80 / 230
» Beacon Based Authentication
Sort
View
ICIAR
2004
Springer
14 years 2 months ago
Environment Authentication Through 3D Structural Analysis
Abstract. We address the validation of the current sensed environmental state against a model known from earlier perception. Our surface based approach compares 3D range data of a ...
Toby P. Breckon, Robert B. Fisher
TIT
2010
121views Education» more  TIT 2010»
13 years 3 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa

Publication
295views
13 years 5 months ago
 Self-Authentication Of Natural Color Images In Pascal Transform Domain
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
ECCV
2006
Springer
14 years 10 months ago
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
Sébastien Marcel, Yann Rodriguez
POPL
2005
ACM
14 years 9 months ago
Inferring authentication tags
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...