Sciweavers

574 search results - page 54 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
DAC
2009
ACM
13 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICPR
2002
IEEE
14 years 11 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
ACSAC
2003
IEEE
14 years 3 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
ITCC
2005
IEEE
14 years 3 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch