Sciweavers

9503 search results - page 61 / 1901
» Authenticated System Calls
Sort
View
AINA
2004
IEEE
15 years 8 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
IJNSEC
2008
155views more  IJNSEC 2008»
15 years 4 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
SOUPS
2010
ACM
15 years 8 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
SSWMC
2004
15 years 6 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
15 years 2 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...