Sciweavers

9503 search results - page 14 / 1901
» Authenticated System Calls
Sort
View
VCIP
2003
153views Communications» more  VCIP 2003»
15 years 1 months ago
Flexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Yanjiang Yang, Feng Bao, Robert H. Deng
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 11 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 5 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
SSS
2009
Springer
15 years 6 months ago
A Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver n...
Lifeng Sang, Anish Arora