Sciweavers

632 search results - page 88 / 127
» Two Facets of Authentication
Sort
View
ICIAP
1999
ACM
14 years 1 months ago
Facial Expression Morphing and Animation with Local Warping Methods
In this paper, we applied local warping techniques to construct a frame work of image-based morphing for facial expressions animation with low complexity. From the experience we o...
Daw-Tung Lin, Han Huang
AGENTS
1998
Springer
14 years 1 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
14 years 16 days ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
FC
2006
Springer
147views Cryptology» more  FC 2006»
14 years 14 days ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
CCS
2008
ACM
13 years 10 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim