Sciweavers

9503 search results - page 65 / 1901
» Authenticated System Calls
Sort
View
EVOTING
2004
171views Hardware» more  EVOTING 2004»
15 years 6 months ago
Towards Remote E-Voting: Estonian case
: This paper gives an overview about the Estonian e-voting system. Paper discusses how the concept of e-voting system is designed to resist some of the main challenges of remote e-...
Epp Maaten
115
Voted
ICIAP
2003
ACM
16 years 4 months ago
Multimodal biometric authentication using quality signals in mobile communications
The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and s...
Josef Bigün, Julian Fiérrez-Aguilar, J...
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 11 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
CSFW
2005
IEEE
15 years 10 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CCS
2004
ACM
15 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei