Sciweavers

9503 search results - page 60 / 1901
» Authenticated System Calls
Sort
View
ECCV
2004
Springer
15 years 10 months ago
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Abstract. In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the con...
Pim Tuyls, Jasper Goseling
IJIT
2004
15 years 6 months ago
Sensing Pressure for Authentication System Using Keystroke Dynamics
In this paper, an authentication system using keystroke dynamics is presented. We introduced pressure sensing for the improvement of the accuracy of measurement and durability agai...
Hidetoshi Nonaka, Masahito Kurihara
ICIP
2007
IEEE
16 years 6 months ago
Stream Authentication Based on Generlized Butterfly Graph
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
MADNES
2005
Springer
15 years 10 months ago
ARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A ...
Suk-Bok Lee, Yoon-Hwa Choi
ADHOC
2007
134views more  ADHOC 2007»
15 years 4 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu