Sciweavers

24529 search results - page 119 / 4906
» Computing on Authenticated Data
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 7 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
ICANN
2007
Springer
15 years 6 months ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
ACSAC
1997
IEEE
15 years 6 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
USENIX
2007
15 years 4 months ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah
ICVGIP
2008
15 years 3 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi