Sciweavers

24529 search results - page 44 / 4906
» Computing on Authenticated Data
Sort
View
SAC
2003
ACM
14 years 3 months ago
Authenticity in a Reliable Protocol for Mobile Computing
Nicoletta De Francesco, Marinella Petrocchi
ICIP
2002
IEEE
14 years 11 months ago
Lossless authentication of MPEG-2 video
In authentication using watermarking, the original media needs to be slightly modified in order to embed a short media digest in the media itself. Lossless authentication watermar...
Jiri Fridrich, Rui Du
ISPEC
2007
Springer
14 years 4 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
14 years 1 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
CCS
2010
ACM
14 years 4 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...