Sciweavers

24529 search results - page 105 / 4906
» Computing on Authenticated Data
Sort
View
PERCOM
2004
ACM
16 years 1 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
3DPVT
2004
IEEE
141views Visualization» more  3DPVT 2004»
15 years 6 months ago
Exploitation of 3D Images for Face Authentication Under Pose and Illumination Variations
An appearance-based face authentication system integrating 2D color or intensity images and 3D data is presented in this paper. The proposed system is based on a low-cost 3D and c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
120
Voted
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 2 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
MOBISYS
2010
ACM
15 years 4 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov