Sciweavers

485 search results - page 66 / 97
» Authentication by Biometric Verification
Sort
View
ICDAR
2009
IEEE
14 years 7 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
ICCSA
2007
Springer
15 years 3 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
15 years 1 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
AVBPA
2003
Springer
134views Biometrics» more  AVBPA 2003»
15 years 1 months ago
Face Verification Competition on the XM2VTS Database
In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. The database us...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, S&...
NDSS
2002
IEEE
15 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...