Sciweavers

9503 search results - page 81 / 1901
» Authenticated System Calls
Sort
View
104
Voted
SRDS
2003
IEEE
15 years 10 months ago
A Reliable Key Authentication Schema for Secure Multicast Communications
Roberto Di Pietro, Antonio Durante, Luigi V. Manci...
SECURWARE
2008
IEEE
15 years 11 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
138
Voted
ICBA
2004
Springer
148views Biometrics» more  ICBA 2004»
15 years 10 months ago
Feature-Level Fusion for Effective Palmprint Authentication
Abstract. A feature-level fusion approach is proposed for improving the efficiency of palmprint identification. Multiple Gabor filters are employed to extract the phase information...
Adams Wai-Kin Kong, David Zhang
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
15 years 6 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik