Sciweavers

9503 search results - page 101 / 1901
» Authenticated System Calls
Sort
View
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
15 years 9 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
PR
2010
179views more  PR 2010»
15 years 3 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
ICIP
2004
IEEE
16 years 6 months ago
Authentication of MPEG-4-based surveillance video
The industry is currently starting to use MPEG-4 compressed digital video for surveillance applications. The transition from analog to digital video raises difficulties for using ...
Michael Pramateftakis, Tobias Oelbaum, Klaus Diepo...
126
Voted
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 10 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
134
Voted
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 10 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht