104
click to vote
ACISP
15 years 2 months ago
2005 Springer
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
110
click to vote
ACISP
15 years 2 months ago
2005 Springer
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
ACISP
15 years 2 months ago
2005 Springer
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
ACISP
15 years 2 months ago
2005 Springer
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
ACISP
15 years 2 months ago
2005 Springer
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
|