Sciweavers

24529 search results - page 87 / 4906
» Computing on Authenticated Data
Sort
View
111
Voted
ICIP
2008
IEEE
16 years 2 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
83
Voted
APNOMS
2006
Springer
15 years 4 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
CHI
2011
ACM
14 years 4 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
133
Voted
SPC
2005
Springer
15 years 6 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
95
Voted
SPW
2005
Springer
15 years 6 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong