Sciweavers

248 search results - page 8 / 50
» Authentication Primitives and Their Compilation
Sort
View
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
CCS
2000
ACM
15 years 1 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
DATAMINE
1999
80views more  DATAMINE 1999»
14 years 9 months ago
MSQL: A Query Language for Database Mining
The tremendous number of rules generated in the mining process makes it necessary for any good data mining system to provide for powerful query primitives to post-process the gener...
Tomasz Imielinski, Aashu Virmani
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
CC
2003
Springer
103views System Software» more  CC 2003»
15 years 3 months ago
A Pattern Matching Compiler for Multiple Target Languages
Many processes can be seen as transformations of tree-like data structures. In compiler construction, for example, we continuously manipulate trees and perform tree transformations...
Pierre-Etienne Moreau, Christophe Ringeissen, Mari...