Sciweavers

632 search results - page 76 / 127
» Two Facets of Authentication
Sort
View
TNC
2004
103views Education» more  TNC 2004»
13 years 10 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
PR
2008
137views more  PR 2008»
13 years 8 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
RFIDSEC
2010
13 years 7 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
ICB
2009
Springer
173views Biometrics» more  ICB 2009»
13 years 6 months ago
Bayesian Networks to Combine Intensity and Color Information in Face Recognition
We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
Guillaume Heusch, Sébastien Marcel
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 11 days ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal