Sciweavers

24529 search results - page 41 / 4906
» Computing on Authenticated Data
Sort
View
ICCTA
2007
IEEE
14 years 4 months ago
Modeling Time-Varying Population for Biometric Authentication
Population size plays a major role in determining the performance of any biometric authentication system, particularly when such systems are used for civilian applications. In thi...
Vandana Roy, C. V. Jawahar
AINA
2009
IEEE
14 years 3 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
ICDCSW
2002
IEEE
14 years 2 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 10 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 10 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao