Sciweavers

24529 search results - page 15 / 4906
» Computing on Authenticated Data
Sort
View
ICAI
2004
13 years 11 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
COMSWARE
2007
IEEE
14 years 4 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
WOA
2010
13 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ICCSA
2007
Springer
14 years 4 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 10 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...