“iD PHOTO” FOR MOBILE STORAGE

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ID Generation in Mobile Environments

This work is focused in the ID generation problem in mobile environments. We discuss the suitability of traditional mechanisms and techniques to generate IDs in mobile environments. Based on the “Birthday Problem”, we deduced some formulas to evaluate the ID trust that is directly related to the number of entities in the system. The estimation of the system size revels to be the main problem of...

متن کامل

ID-Based Cryptography for Secure Cloud Data Storage

This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it of...

متن کامل

Redesigning photo-ID to improve unfamiliar face matching performance.

Viewers find it difficult to match photos of unfamiliar faces for identity. Despite this, the use of photographic ID is widespread. In this study we ask whether it is possible to improve face matching performance by replacing single photographs on ID documents with multiple photos or an average image of the bearer. In 3 experiments we compare photo-to-photo matching with photo-to-average matchi...

متن کامل

ID-Based Deniable Authentication Protocol Suitable for Mobile Devices

This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, i...

متن کامل

ID-based Authenticated Key Agreement for Low-Power Mobile Devices

In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments : an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients’ devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions of the Magnetics Society of Japan

سال: 2002

ISSN: 1884-6726,1346-7948

DOI: 10.3379/tmjpn2001.2.290