Secure Human Communications Based on Biometrics Signals
User authentication is the first and probably the most challenging step in achieving secure person-to-person communications. Most of the existing authentication schemes require communicating parties either share a secret/password or know each other's public key. In this paper we suggest a novel...
Saved in:
Main Authors: | WU, Yongdong, BAO, Feng, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/586 https://ink.library.smu.edu.sg/context/sis_research/article/1585/viewcontent/Dengwuyongdong_sec05b.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Security of an ill-posed operator based scheme for image authentication
by: WU, Yongdong, et al.
Published: (2005) -
Efficient and practical fair exchange protocols with off-line TTP
by: BAO, Feng, et al.
Published: (1998) -
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
by: WU, Yongdong, et al.
Published: (2007) -
Securing JPEG2000 code-streams
by: DENG, Robert H., et al.
Published: (2005) -
SOCI: A Toolkit for Secure Outsourced Computation on Integers
by: ZHAO, Bowen, et al.
Published: (2022)