Sciweavers

299 search results - page 5 / 60
» Deniable Authentication on the Internet
Sort
View
JCP
2007
117views more  JCP 2007»
13 years 7 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
ICBA
2004
Springer
198views Biometrics» more  ICBA 2004»
14 years 1 months ago
Face Authentication Competition on the BANCA Database
Abstract. This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contes...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
ACISP
2008
Springer
14 years 2 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
ICIP
2004
IEEE
14 years 9 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
CRYPTO
2010
Springer
140views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky