Sciweavers

24529 search results - page 2 / 4906
» Computing on Authenticated Data
Sort
View
SIBGRAPI
2003
IEEE
13 years 10 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
DIM
2006
ACM
13 years 11 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
SAC
2003
ACM
13 years 10 months ago
Authentication of LZ-77 Compressed Data
Mikhail J. Atallah, Stefano Lonardi
ICPR
2008
IEEE
13 years 11 months ago
Using SIFT features in palmprint authentication
As a new branch of biometrics, palmprint authentication has attracted increasing amount of attention because palmprints are abundant of line features so that low resolution images...
Jiansheng Chen, Yiu Sang Moon
CASES
2010
ACM
13 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman