Sciweavers

24529 search results - page 97 / 4906
» Computing on Authenticated Data
Sort
View
ICISS
2007
Springer
14 years 3 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CISS
2008
IEEE
14 years 5 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 5 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
WWIC
2007
Springer
109views Communications» more  WWIC 2007»
14 years 5 months ago
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework
It is sometimes believed that a “broadband access” network, providing ample transmission capacity to residential environments, is enough so as to allow a flawless delivery of a...
Iván Vidal, Francisco Valera, Jaime Garc&ia...
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 11 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente