Sciweavers

1116 search results - page 68 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
PR
2006
167views more  PR 2006»
13 years 8 months ago
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system's accuracy. Despite many works in the literature, it is surprising t...
Norman Poh, Samy Bengio
AINA
2009
IEEE
14 years 1 months ago
Advantages of User Authentication Using Unclear Images
— A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the origi...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
USENIX
2008
13 years 10 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
TDSC
2008
99views more  TDSC 2008»
13 years 8 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
SEC
2004
13 years 9 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis