Sciweavers

1150 search results - page 92 / 230
» Beacon Based Authentication
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
ICIAP
2005
ACM
14 years 2 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 1 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
3DPVT
2004
IEEE
141views Visualization» more  3DPVT 2004»
14 years 20 days ago
Exploitation of 3D Images for Face Authentication Under Pose and Illumination Variations
An appearance-based face authentication system integrating 2D color or intensity images and 3D data is presented in this paper. The proposed system is based on a low-cost 3D and c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...