Sciweavers

1466 search results - page 35 / 294
» Completeness of the Authentication Tests
Sort
View
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 9 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 1 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 2 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
DAC
1998
ACM
13 years 12 months ago
Efficient Analog Test Methodology Based on Adaptive Algorithms
This papers describes a new, fast and economical methodology to test linear analog circuits based on adaptive algorithms. To the authors knowledge, this is the first time such tec...
Luigi Carro, Marcelo Negreiros
BMCBI
2006
122views more  BMCBI 2006»
13 years 7 months ago
Genome comparison using Gene Ontology (GO) with statistical testing
Background: Automated comparison of complete sets of genes encoded in two genomes can provide insight on the genetic basis of differences in biological traits between species. Gen...
Zhaotao Cai, Xizeng Mao, Songgang Li, Liping Wei