Sciweavers

308 search results - page 35 / 62
» A New Model for Public-Key Authentication
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 4 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
MAS
1998
Springer
153views Communications» more  MAS 1998»
15 years 4 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 9 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
SCN
2010
Springer
163views Communications» more  SCN 2010»
14 years 9 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia
ICPR
2008
IEEE
16 years 1 months ago
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation
The proliferation of handheld devices such as PDAs and smartphones represents a new scenario for automatic signature verification. Traditionally, research on signature verificatio...
Marcos Martinez-Diaz, Julian Fiérrez-Aguila...