Sciweavers

9503 search results - page 92 / 1901
» Authenticated System Calls
Sort
View
164
Voted
ASIACRYPT
2001
Springer
15 years 8 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
157
Voted
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 11 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
143
Voted
FGR
2006
IEEE
134views Biometrics» more  FGR 2006»
15 years 11 months ago
Local Binary Patterns as an Image Preprocessing for Face Authentication
One of the major problem in face authentication systems is to deal with variations in illumination. In a realistic scenario, it is very likely that the lighting conditions of the ...
Guillaume Heusch, Yann Rodriguez, Sébastien...
151
Voted
VIP
2001
15 years 6 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 7 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....