Sciweavers

99 search results - page 10 / 20
» Enhancing E-commerce Security Using GSM Authentication
Sort
View
95
Voted
BIOSIG
2008
105views Biometrics» more  BIOSIG 2008»
15 years 1 months ago
A Novel Privacy Enhancing Algorithm for Biometric System
: Biometrics provide the possibility of unique and convenient authentication. As its application areas grow rapidly, the problems, such as identity fraud and cross matching, threat...
Xuebing Zhou, Christoph Busch
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
106
Voted
BIOSIG
2008
143views Biometrics» more  BIOSIG 2008»
15 years 1 months ago
A Reference Architecture for Biometric Template Protection based on Pseudo Identities
Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...
103
Voted
BROADNETS
2006
IEEE
15 years 5 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 4 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak