Sciweavers

1573 search results - page 154 / 315
» Strong User Authentication
Sort
View
ESAS
2007
Springer
15 years 8 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel
ESAS
2007
Springer
15 years 8 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
15 years 8 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....
IEEEARES
2006
IEEE
15 years 8 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu
ISM
2006
IEEE
88views Multimedia» more  ISM 2006»
15 years 8 months ago
Interactive Content Overviews for Lecture Recordings
Lecture recordings can be a powerful addition to traditional lectures and they can even serve as a main content source in a number of didactic scenarios. If users can quickly loca...
Robert Mertens, Markus Ketterl, Oliver Vornberger