Sciweavers

255 search results - page 17 / 51
» Principles for Entity Authentication
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
KES
2007
Springer
14 years 1 months ago
An Open Source Java Framework for Biometric Web Authentication Based on BioAPI
One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The Bio...
Elisardo González-Agulla, Enrique Otero Mur...
ICDS
2010
IEEE
14 years 2 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
FOSSACS
2009
Springer
14 years 2 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
ICIP
2003
IEEE
14 years 9 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran