Sciweavers

130 search results - page 11 / 26
» New approaches for deniable authentication
Sort
View
IWBRS
2005
Springer
145views Biometrics» more  IWBRS 2005»
14 years 1 months ago
Face Authentication Using One-Class Support Vector Machines
Abstract. This paper proposes a new method for personal identity verification based the analysis of face images applying One Class Support Vector Machines. This is a recently intr...
Manuele Bicego, Enrico Grosso, Massimo Tistarelli
IH
2001
Springer
14 years 26 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
CIIA
2009
13 years 9 months ago
A Study on the Convergence of FingerHashing and a Secured Biometric System
Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliabil...
Rima Belguechi, Christophe Rosenberger
TPHOL
2003
IEEE
14 years 1 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
GLOBECOM
2009
IEEE
14 years 9 days ago
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks
Many existing pairwise key establishment in sensor networks were developed based on the polynomial-based method. However, this method cannot offer the basic authentication function...
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Ch...