The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
In this paper we present a novel method for reducing false positives in breast mass detection. Our approach is based on using the Two-Dimensional Principal Component Analysis (2DPC...
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...