Sciweavers

1573 search results - page 43 / 315
» Strong User Authentication
Sort
View
PVLDB
2010
179views more  PVLDB 2010»
13 years 9 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...
ICB
2007
Springer
124views Biometrics» more  ICB 2007»
14 years 5 months ago
Face Authentication with Salient Local Features and Static Bayesian Network
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Guillaume Heusch, Sébastien Marcel
EUC
2008
Springer
14 years 21 days ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
SIGECOM
2008
ACM
92views ECommerce» more  SIGECOM 2008»
13 years 11 months ago
Strong regularities in online peer production
Online peer production systems have enabled people to coactively create, share, classify, and rate content on an unprecedented scale. This paper describes strong macroscopic regul...
Dennis M. Wilkinson
ICISC
2001
156views Cryptology» more  ICISC 2001»
14 years 9 days ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet