Sciweavers

6555 search results - page 133 / 1311
» Secure attribute-based systems
Sort
View
105
Voted
ICIP
2001
IEEE
16 years 3 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...
IFIP11
2004
110views Business» more  IFIP11 2004»
15 years 3 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
128
Voted
CIIA
2009
15 years 3 months ago
A Study on the Convergence of FingerHashing and a Secured Biometric System
Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliabil...
Rima Belguechi, Christophe Rosenberger
AAAI
2004
15 years 3 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...