Sciweavers

574 search results - page 47 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 8 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
WS
2004
ACM
14 years 3 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
WISEC
2009
ACM
14 years 4 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
ICIAR
2004
Springer
14 years 3 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
ACSAC
2003
IEEE
14 years 3 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...