In this paper, we consider efficient authenticated key This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in...
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...