Sciweavers

257 search results - page 22 / 52
» On the Security of RSA Screening
Sort
View
ICCSA
2004
Springer
14 years 1 months ago
Practical Digital Signature Generation Using Biometrics
Abstract. It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without usin...
Taekyoung Kwon, Jaeil Lee
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
13 years 5 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
WSC
2004
13 years 9 months ago
Simulation of an Airport Passenger Security System
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...
AVSS
2007
IEEE
14 years 2 months ago
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these fre...
Mike C. Kemp
ACISP
2003
Springer
14 years 1 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon