Sciweavers

1466 search results - page 5 / 294
» Completeness of the Authentication Tests
Sort
View
150
Voted
TCS
2002
15 years 3 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
126
Voted
ICPR
2004
IEEE
16 years 4 months ago
Face Authentication Test on the BANCA Database
This paper details the results of a Face Authentication Test (FAT2004) [2] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held ...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
125
Voted
FOSSACS
2009
Springer
15 years 10 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
82
Voted
SAC
2002
ACM
15 years 3 months ago
A conceptual framework for testing biometric algorithms within operating systems' authentication
Arslan Brömme, Marcel Kronberg, Oliver Ellenb...
119
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...