Sciweavers

1050 search results - page 1 / 210
» Two methods of authenticated positioning
Sort
View
MSWIM
2006
ACM
14 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ICIP
2002
IEEE
14 years 11 months ago
Lossless authentication of MPEG-2 video
In authentication using watermarking, the original media needs to be slightly modified in order to embed a short media digest in the media itself. Lossless authentication watermar...
Jiri Fridrich, Rui Du
MCETECH
2009
Springer
14 years 4 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
HUC
2007
Springer
14 years 4 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
SACRYPT
2001
Springer
136views Cryptology» more  SACRYPT 2001»
14 years 2 months ago
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC ba...
Bert den Boer, Bart Van Rompay, Bart Preneel, Joos...