Sciweavers

135 search results - page 2 / 27
» Machine Authentication of Security Documents
Sort
View
USENIX
2001
13 years 8 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson
ACSAC
2003
IEEE
14 years 20 days ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
ICDAR
2003
IEEE
14 years 20 days ago
Document Identity, Authentication and Ownership: The Future of Biometric Verification
Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly ...
Michael C. Fairhurst
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 20 days ago
Secure data hiding in binary document images for authentication
In this paper, we present a data hiding algorithm for binary document images. This algorithm is based on the DistanceReciprocal Distortion Measure [1] that is used to evaluate the...
Haiping Lu, Alex C. Kot, Jun Cheng
ACSAC
1999
IEEE
13 years 11 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini