Sciweavers

24529 search results - page 85 / 4906
» Computing on Authenticated Data
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 14 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
WINET
2002
101views more  WINET 2002»
13 years 9 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
AVSS
2006
IEEE
14 years 4 months ago
On Person Authentication by Fusing Visual and Thermal Face Biometrics
Recognition algorithms that use data obtained by imaging faces in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often present...
Ognjen Arandjelovic, Riad I. Hammoud, Roberto Cipo...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
ETRICS
2006
14 years 1 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet