Sciweavers

24529 search results - page 63 / 4906
» Computing on Authenticated Data
Sort
View
CSE
2009
IEEE
13 years 7 months ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran
ICPR
2008
IEEE
14 years 11 months ago
Similarity-based matching for face authentication
We propose in this paper a face authentication method based on a similarity measure. The SIFT descriptor is used to define some interest keypoints characterized by an invariant pa...
Christophe Rosenberger, Luc Brun
CQRE
1999
Springer
14 years 2 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
APNOMS
2007
Springer
14 years 4 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo