Sciweavers

375 search results - page 31 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
125
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
TWC
2008
143views more  TWC 2008»
15 years 3 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
144
Voted
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 5 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
119
Voted
APNOMS
2007
Springer
15 years 9 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
15 years 10 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...