Sciweavers

24529 search results - page 70 / 4906
» Computing on Authenticated Data
Sort
View
IANDC
2008
84views more  IANDC 2008»
13 years 8 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
PERCOM
2007
ACM
14 years 9 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
ICB
2007
Springer
184views Biometrics» more  ICB 2007»
14 years 4 months ago
Biometric Template Classification: A Case Study in Iris Textures
Most of the biometric authentication systems store multiple templates per user to account for variations in biometric data. Therefore, these systems suffer from storage space and ...
Edara Srinivasa Reddy, Chinnam SubbaRao, Inampudi ...
SIGCOMM
2010
ACM
13 years 10 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long