Sciweavers

9503 search results - page 115 / 1901
» Authenticated System Calls
Sort
View
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
15 years 11 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
146
Voted
ICPR
2006
IEEE
15 years 11 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang
AVBPA
2005
Springer
240views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Practical Biometric Authentication with Template Protection
Abstract. In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. T...
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevena...
SAC
2004
ACM
15 years 10 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 8 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman