Sciweavers

632 search results - page 20 / 127
» Two Facets of Authentication
Sort
View
ICIP
2002
IEEE
14 years 11 months ago
Lossless authentication of MPEG-2 video
In authentication using watermarking, the original media needs to be slightly modified in order to embed a short media digest in the media itself. Lossless authentication watermar...
Jiri Fridrich, Rui Du
NTMS
2008
IEEE
14 years 4 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
IWBRS
2005
Springer
134views Biometrics» more  IWBRS 2005»
14 years 3 months ago
Using Score Normalization to Solve the Score Variation Problem in Face Authentication
Abstract. This paper investigates the score normalization technique for enhancing the performance of face authentication. We firstly discuss the thresholding approach for face auth...
Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen, ...
LISA
2008
13 years 12 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis