Sciweavers

1656 search results - page 51 / 332
» Secure Computation Without Authentication
Sort
View
146
Voted
WOA
2010
14 years 10 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
89
Voted
CHI
2009
ACM
15 years 7 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
122
Voted
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 6 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
AVBPA
2005
Springer
256views Biometrics» more  AVBPA 2005»
15 years 6 months ago
MOC via TOC Using a Mobile Agent Framework
A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Ma...
Stefano Bistarelli, Stefano Frassi, Anna Vaccarell...
COMCOM
2011
14 years 7 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell