Sciweavers

1018 search results - page 71 / 204
» Remote User Authentication Using Public Information
Sort
View
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 3 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
CHI
2001
ACM
14 years 8 months ago
ConNexus to awarenex: extending awareness to mobile users
We explored the use of awareness information to facilitate communication by developing a series of prototypes. The ConNexus prototype integrates awareness information, instant mes...
John C. Tang, Nicole Yankelovich, James Begole, Ma...
ICASSP
2010
IEEE
13 years 8 months ago
High-resolution glyph-inspection based security system
: © High-Resolution Glyph-Inspection Based Security System Steven J. Simske, Guy Adams HP Laboratories HPL-2010-42 Image forensics, CMOS imaging, authentication, print parasitics,...
Steven J. Simske, Guy Adams
NAR
2011
188views Computer Vision» more  NAR 2011»
12 years 11 months ago
NCBI Epigenomics: a new public resource for exploring epigenomic data sets
The Epigenomics database at the National Center for Biotechnology Information (NCBI) is a new resource that has been created to serve as a comprehensive public resource for whole-...
Ian M. Fingerman, Lee McDaniel, Xuan Zhang, Walter...
TISSEC
2010
237views more  TISSEC 2010»
13 years 2 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...