Correlation-Based Robust Authentication (Cobra) Using Helper Data Only

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Biometric Based Authentication Using Watermarking

In wireless communications, significant information are getting exchanged frequently. Inorder to avoid the illegal access of that sensitive information remote authentication is being done extensively. Remote authentication involves the submission of encrypted information, along with visual and audio cues. Incase of remote examination or interviewing, Trojan Horse and other attacks can cause sev...

متن کامل

Robust Biometrics Based Authentication Scheme Using Watermarking

Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the En...

متن کامل

A correlation framework for continuous user authentication using data mining

The emergence of new transport technologies coupled with deregulation and privatisation has contributed to thecontiguous growth of telecommunications networks particularly in terms of both the intricacy and size of the network.The rapid growth in network size, and intricacy, is of a concern to those who are involved in Network Management -particularly those involved with network...

متن کامل

Extensible Authentication Protocol (EAP) Authentication Using Only a Password

This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. Status of This Memo Thi...

متن کامل

Robust Location Based Partial Correlation Robust Location Based Partial Correlation

The visual correspondence problem is a major issue in computer vision. Correlation is a common tool for this problem. Most classical correlation methods fail near the disparity discontinuities, which occur at the boundaries of objects. In this paper, a partial correlation technique is proposed to solve this problem. Robust location methods are used to perform this partial correlation. Compariso...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2018

ISSN: 2410-387X

DOI: 10.3390/cryptography2030021