Sciweavers

236 search results - page 12 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
CSIE
2009
IEEE
14 years 2 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
DAC
2007
ACM
14 years 8 months ago
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that...
G. Edward Suh, Srinivas Devadas
ARESEC
2011
119views more  ARESEC 2011»
12 years 7 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko