Sciweavers

1018 search results - page 46 / 204
» Remote User Authentication Using Public Information
Sort
View
EUSAI
2007
Springer
14 years 3 months ago
Situated Public News and Reminder Displays
In this paper we present concepts for and experiences with a Situated Public Display system deployed in a university setting. We identify the rate with which information is updated...
Jörg Müller, Oliver Paczkowski, Antonio ...
ICDM
2010
IEEE
154views Data Mining» more  ICDM 2010»
13 years 7 months ago
Mining Public Transport Usage for Personalised Intelligent Transport Systems
Traveller information, route planning, and service updates have become essential components of public transport systems: they help people navigate built environments by providing a...
Neal Lathia, Jon Froehlich, Licia Capra
ISCI
2010
146views more  ISCI 2010»
13 years 6 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 9 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak