Browsing Conference Papers by Subject "Authentication"
Now showing items 1-4 of 4
-
Authenticated collaborative key agreement for dynamic peer groups
(Universiti Malaysia Perlis, 2009-10-11)Many emerging network applications are based upon a group communication model. In a peer-to-peer or adhoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, ... -
Des enabled fingerprint system
(Universiti Malaysia Perlis, 2009-10-11)Biometrics systems function to identify individuals by matching a specific personal characteristic, the biometrics identifier, with one previously recorded. Biometric identification considers individual physiological ... -
Keystroke pressure based typing biometrics authentication system by combining ANN and ANFIS-based classifiers
(Institute of Electrical and Electronics Engineers (IEEE), 2009-03-06)Security of an information system depends to a large extent on its ability to authenticate legitimate users as well as to withstand attacks of various kinds. Confidence in its ability to provide adequate authentication is, ... -
Safety & security on digital information
(Universiti Sains MalaysiaPerpustakaan, 2007-10-31)The fast technological developments in recent years, especially in the field of Telecommunication, Multimedia and Digital technology, have fundamentally changed the way we generate, collect, organize, present and ...