Sciweavers

34 search results - page 7 / 7
» Print signatures for document authentication
Sort
View
GCC
2003
Springer
13 years 10 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
EUROPKI
2007
Springer
13 years 11 months ago
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure
Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with a s...
Dimitrios Lekkas, Dimitris Gritzalis
ICDAR
2003
IEEE
13 years 10 months ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu
JAR
2006
81views more  JAR 2006»
13 years 5 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...