Sciweavers

977 search results - page 38 / 196
» Secret image sharing
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 5 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
15 years 3 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
INFOCOM
2011
IEEE
14 years 3 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 6 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
MM
2004
ACM
139views Multimedia» more  MM 2004»
15 years 5 months ago
MobShare: controlled and immediate sharing of mobile images
In this paper we describe the design and implementation of a mobile phone picture sharing system MobShare that enables immediate, controlled, and organized sharing of mobile pictu...
Risto Sarvas, Mikko Viikari, Juha Pesonen, Hanno N...