Sciweavers

1150 search results - page 98 / 230
» Beacon Based Authentication
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting
Abstract-- A framework for introducing an extrinsic fingerprint signal to space-time coded transmissions at the physical-layer is presented, whereby the fingerprint signal conveys ...
Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Ch...
JDCTA
2010
150views more  JDCTA 2010»
13 years 3 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
14 years 3 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
ESORICS
2007
Springer
14 years 3 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
AINA
2007
IEEE
14 years 28 days ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...