Sciweavers

1365 search results - page 59 / 273
» Simple authentication for the web
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 7 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
WMASH
2005
ACM
15 years 6 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 5 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ICDAR
2003
IEEE
15 years 6 months ago
An HMM On-line Signature Verifier Incorporating Signature Trajectories
Authentication of individuals is rapidly becoming an important issue. On-line signature verification is one of the methods that use biometric features. This paper proposes a new H...
Daigo Muramatsu, Takashi Matsumoto
MEDIAFORENSICS
2010
15 years 2 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo