Sciweavers

9503 search results - page 42 / 1901
» Authenticated System Calls
Sort
View
DAC
2005
ACM
16 years 5 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
15 years 9 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
TIT
2008
84views more  TIT 2008»
15 years 4 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
WISTP
2010
Springer
15 years 2 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
PLDI
1994
ACM
15 years 8 months ago
Optimizing Dynamically-Dispatched Calls with Run-Time Type Feedback
: Object-oriented programs are difficult to optimize because they execute many dynamically-dispatched calls. These calls cannot easily be eliminated because the compiler does not k...
Urs Hölzle, David Ungar