Sciweavers

9503 search results - page 128 / 1901
» Authenticated System Calls
Sort
View
167
Voted
PERCOM
2011
ACM
14 years 8 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 9 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
BIOSIG
2008
143views Biometrics» more  BIOSIG 2008»
15 years 6 months ago
A Reference Architecture for Biometric Template Protection based on Pseudo Identities
Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...
CSREASAM
2006
15 years 6 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
HAPTICS
2006
IEEE
15 years 11 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...