Sciweavers

24529 search results - page 114 / 4906
» Computing on Authenticated Data
Sort
View
CONCUR
2005
Springer
15 years 8 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
WIRN
2005
Springer
15 years 8 months ago
An Automatic Feature Based Face Authentication System,
Abstract. In this paper a fully automatic face verification system is presented. A face is characterized by a vector (jet) of coefficients determined applying a bank of Gabor fil...
Stefano Arca, Paola Campadelli, Elena Casiraghi, R...
141
Voted
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
15 years 5 days ago
Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication
In this paper we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic...
Sharmeen Shahabuddin, Razib Iqbal, Shervin Shirmoh...
MOBIHOC
2005
ACM
16 years 2 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
ICPR
2006
IEEE
16 years 3 months ago
New Experiments on ICP-Based 3D Face Recognition and Authentication
In this paper, we discuss new experiments on face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity images,...
Boulbaba Ben Amor, Liming Chen, Mohsen Ardabilian