Sciweavers

166 search results - page 20 / 34
» Protecting Applications with Transient Authentication
Sort
View
IDTRUST
2010
ACM
14 years 1 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
GCC
2007
Springer
14 years 27 days ago
A Resource-based Reputation Rating Mechanism for Peer-to-Peer Networks
As various kinds of peer-to-peer (P2P) applications become popular and widely known to people all around the world, research on P2P networks has received considerable interest. Re...
Huan Chen, Guihai Chen
SAC
2005
ACM
14 years 9 days ago
SELS: a secure e-mail list service
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
Himanshu Khurana, Adam J. Slagell, Rafael Bonilla
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
13 years 8 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
BIOSIG
2008
105views Biometrics» more  BIOSIG 2008»
13 years 8 months ago
A Novel Privacy Enhancing Algorithm for Biometric System
: Biometrics provide the possibility of unique and convenient authentication. As its application areas grow rapidly, the problems, such as identity fraud and cross matching, threat...
Xuebing Zhou, Christoph Busch