We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy
conditions and communication costs. This is motivated by a
numbe...
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...