نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

2008
JONNY ANOMALY

This essay examines and criticizes a set of Kantian objections to Parfit’s attempt in Reasons and Persons to connect his theory of personal identity to practical rationality and moral philosophy. Several of Parfit’s critics have tried to sever the link he forges between his metaphysical and practical conclusions by invoking the Kantian thought that even if we accept his metaphysical theory of p...

2010
Kouji Kozaki Satoshi Endo Riichiro Mizoguchi

For knowledge representation based on ontology and its use, it is desirable to understand phenomena in the target world as precisely and deeply as possible. The ontology should reflect the understanding of them and provide a fundamental framework to manage the behavior of instances adequately. The management of instance model requires identity of things. Contrary to the common understanding, th...

2013
Gergely Alpár Bart Jacobs

IRMA is an abbreviation for “I Reveal My Attributes”, and at the same time it is the name of a project run by the Digital Security group of the University of Nijmegen and its partners to get attribute-based identity management up and running. This hands-on approach forces us to elaborate many unexplored issues, leading to a better understanding of attributes and their possibilities and challeng...

Journal: :IJACT 2008
Xavier Boyen

This paper surveys the practical benefits and drawbacks of several identitybased encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully-secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the mai...

Journal: :Computers & Security 2004
Enzhe Yu Sungzoon Cho

Password is the most widely used identity verification method in computer security domain. However, because of its simplicity, it is vulnerable to imposter attacks. Use of keystroke dynamics can result in a more secure verification system. Recently, Cho et al. (J Organ Comput Electron Commerce 10 (2000) 295) proposed autoassociative neural network approach, which used only the user’s typing pat...

2007
Zhu Wang Huiyan Chen

In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.

Journal: :IACR Cryptology ePrint Archive 2017
Sarah McCarthy Neil Smyth Elizabeth O'Sullivan

An identity-based encryption scheme enables the efficient distribution of keys in a multi-user system. Such schemes are particularly attractive in resource constrained environments where critical resources such as processing power, memory and bandwidth are severely limited. This research examines the first pragmatic lattice-based IBE scheme presented by Ducas, Lyubashevsky and Prest in 2014 and...

2003
Enzhe Yu Sungzoon Cho

Password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposter attacks. One way to add a shield to password is to employ keystroke dynamics, which is a biometric-based approach. Without manual preprocessing to remove noises and outliers resulted from typing inconsistencies, a poor detection accuracy results...

2010
Mariano Phielipp Magdiel Galan Richard Lee Branislav Kveton Jeffrey Hightower

Non-invasive identity inference in the home environment is a very challenging problem. A practical solution to the problem could have far reaching implications in many industries, such as home entertainment. In this work, we consider the problem of identity inference using a TV remote control. In particular, we address two challenges that have so far prevented the work of Chang et al. (2009) fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید