Sciweavers

632 search results - page 86 / 127
» Two Facets of Authentication
Sort
View
ICCSA
2005
Springer
14 years 2 months ago
Modelling of Process of Electronic Signature with Petri Nets and (Max, Plus) Algebra
This article discusses the modelling and the evaluation of process of electronic signature (ES). According to a certain point of view, this process can be shown as a class of Dynam...
Ahmed Nait-Sidi-Moh, Maxime Wack
CCS
2004
ACM
14 years 2 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
ICBA
2004
Springer
180views Biometrics» more  ICBA 2004»
14 years 2 months ago
FVC2004: Third Fingerprint Verification Competition
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracki...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
INDOCRYPT
2004
Springer
14 years 2 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 2 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...