Sciweavers

286 search results - page 15 / 58
» Authentication in the Taos Operating System
Sort
View
IEEEARES
2006
IEEE
15 years 3 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
LISA
2001
14 years 11 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
ICIAP
2007
ACM
15 years 4 months ago
Dynamic Score Selection for Fusion of Multiple Biometric Matchers
A biometric system for user authentication produces a matching score representing the degree of similarity of the input biometry with the set of templates for that user. If the sc...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SACMAT
2005
ACM
15 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...