Sciweavers

34 search results - page 3 / 7
» Approximate Message Authentication and Biometric Entity Auth...
Sort
View
IWBRS
2005
Springer
134views Biometrics» more  IWBRS 2005»
13 years 11 months ago
Using Score Normalization to Solve the Score Variation Problem in Face Authentication
Abstract. This paper investigates the score normalization technique for enhancing the performance of face authentication. We firstly discuss the thresholding approach for face auth...
Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen, ...
TDSC
2008
99views more  TDSC 2008»
13 years 5 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
13 years 11 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
WS
2004
ACM
13 years 11 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
WS
2006
ACM
13 years 11 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj