Advances in Cryptology - CRYPTO '92: Twelfth Annual International Cryptology Conference, Santa Barbara, California, U. S. A., August 16-20, 1992, Proceedings
Probability and Statistics with Reliability, Queuing and Computer Science Applications
Probability and Statistics with Reliability, Queuing and Computer Science Applications
Computer Security and Industrial Cryptography: State of the Art and Evolution: ESAT Course, Leuven, Belgium, May 21-23, 1991
Advances in Cryptology - AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-15, 1992 Proceedings
Advances in Cryptology, ASIACRYPT '91: First International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991: Proceedings
Better Login Protocols for Computer Networks
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Mode preference in a simple data-retrieval task
HLT '93 Proceedings of the workshop on Human Language Technology
Computational Aspects of VLSI
Integrated network computing models, programming modes and software tools
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Mobile Computing: Operational Models, Programming Modes and Software Tools
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Hi-index | 0.00 |
A statistical zero-knowledge authentication scheme is described for security control in on-line database transaction processing systems (OLTP). This scheme uses probabilistic quorum protocols to validate users using their biometrical characteristics (such as speech, handwriting and keyboard characteristics). This authentication scheme can be implemented using the present-day smart card technology.