Sciweavers

632 search results - page 33 / 127
» Two Facets of Authentication
Sort
View
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
14 years 3 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 3 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
COMCOM
2010
129views more  COMCOM 2010»
13 years 9 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
AVBPA
2005
Springer
347views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Palmprint Authentication Based on Orientation Code Matching
Abstract. This paper presents a novel approach of palmprint authentication by matching the orientation code. In this approach, each point on a palmprint is assigned a orientation. ...
Xiangqian Wu, Kuanquan Wang, David Zhang
EUROCRYPT
2001
Springer
14 years 1 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin