Sciweavers

24529 search results - page 101 / 4906
» Computing on Authenticated Data
Sort
View
WS
2006
ACM
15 years 8 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
PDCAT
2005
Springer
15 years 7 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
AINA
2009
IEEE
15 years 7 months ago
Advantages of User Authentication Using Unclear Images
— A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the origi...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
15 years 7 months ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein
ECCV
2004
Springer
15 years 7 months ago
Authentic Emotion Detection in Real-Time Video
Abstract. There is a growing trend toward emotional intelligence in humancomputer interaction paradigms. In order to react appropriately to a human, the computer would need to have...
Yafei Sun, Nicu Sebe, Michael S. Lew, Theo Gevers