Sciweavers

2108 search results - page 259 / 422
» Encrypted
Sort
View
ACISP
2008
Springer
15 years 10 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
CISS
2007
IEEE
15 years 10 months ago
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
— The problem of detecting encrypted information flows using timing information is considered. An information flow consists of both information-carrying packets and irrelevant ...
Ting He, Lang Tong
CSFW
2007
IEEE
15 years 10 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
15 years 10 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 10 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang