Sciweavers

236 search results - page 35 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
ICSOC
2003
Springer
14 years 24 days ago
Disconnected Operation Service in Mobile Grid Computing
Abstract. In this paper, we discuss on the extension of grid computing systems in mobile computing environments, where mobile devices can be effectively incorporated into the grid ...
Sang-Min Park, Young-Bae Ko, Jai-Hoon Kim
ICPR
2010
IEEE
13 years 11 months ago
Video Based Palmprint Recognition
The ability to carry out biometric authentication using generic cameras can be extremely useful for a variety of applications, especially in mobile devices. Palmprint based authen...
Chhaya Methani, Anoop Namboodiri
IJACT
2008
136views more  IJACT 2008»
13 years 7 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...