Sciweavers

24529 search results - page 78 / 4906
» Computing on Authenticated Data
Sort
View
COMCOM
2011
13 years 5 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
IV
2006
IEEE
95views Visualization» more  IV 2006»
14 years 4 months ago
A Pragmatic and Musically Pleasing Production System for Sonic Events
We describe a novel application for sonic events namely their generation via mathematical functions implemented on a universal all purpose Java platform. Their design is driven by...
Marc Conrad, Tim French, Marcia Gibson
WPES
2003
ACM
14 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
AVBPA
2005
Springer
240views Biometrics» more  AVBPA 2005»
14 years 3 months ago
Practical Biometric Authentication with Template Protection
Abstract. In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. T...
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevena...
SIGMOD
2006
ACM
174views Database» more  SIGMOD 2006»
14 years 10 months ago
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to acce...
Feifei Li, Marios Hadjieleftheriou, George Kollios...