Sciweavers

14 search results - page 3 / 3
» secrypt 2008
Sort
View
SECRYPT
2008
111views Business» more  SECRYPT 2008»
13 years 6 months ago
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems
Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, ...
SECRYPT
2008
74views Business» more  SECRYPT 2008»
13 years 6 months ago
A Note on Biometrics-based Authentication with Portable Device
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano...
SECRYPT
2008
125views Business» more  SECRYPT 2008»
13 years 6 months ago
CSteg: Talking in C Code - Steganography of C Source Code in Text
Jorge Blasco Alís, Julio César Hern&...
SECRYPT
2008
107views Business» more  SECRYPT 2008»
13 years 6 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair