Sciweavers

242 search results - page 27 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
13 years 11 months ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
FC
2008
Springer
133views Cryptology» more  FC 2008»
13 years 9 months ago
A Proof of Concept Attack against Norwegian Internet Banking Systems
Abstract. The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nation...
Yngve Espelid, Lars-Helge Netland, André N....
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 18 days ago
Organizational Memory Systems: Challenges for Information Technology
Organizations subsist on communication and coordination. An organization’s ability to remember and learn from its past, in other words, its ability to use its “organizational ...
Michael E. Atwood
MICRO
2007
IEEE
164views Hardware» more  MICRO 2007»
14 years 1 months ago
A Practical Approach to Exploiting Coarse-Grained Pipeline Parallelism in C Programs
The emergence of multicore processors has heightened the need for effective parallel programming practices. In addition to writing new parallel programs, the next generation of pr...
William Thies, Vikram Chandrasekhar, Saman P. Amar...
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
13 years 12 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance